This is a repository copy of Secure D2D Communication in Large-Scale Cognitive Cellular Networks with Wireless Power Transfer.

Size: px
Start display at page:

Download "This is a repository copy of Secure D2D Communication in Large-Scale Cognitive Cellular Networks with Wireless Power Transfer."

Transcription

1 This is a reository coy of Secure D2D Communication in Large-Scale Cognitive Cellular Networks with Wireless Power Transfer. White Rose Research Online URL for this aer: htt://erints.whiterose.ac.uk/683/ Version: Acceted Version Proceedings Paer: Liu, Y, Wang, L, Zaidi, SAR et al. 2 more authors) 25) Secure D2D Communication in Large-Scale Cognitive Cellular Networks with Wireless Power Transfer. In: ICC IEEE International Conference on Communications. ICC IEEE International Conference on Communications, 8-2 Jun 25, ExCel London, UK. IEEE, ISBN htts://doi.org/.9/icc c) 25 IEEE. Personal use of this material is ermitted. Permission from IEEE must be obtained for all other users, including rerinting/ reublishing this material for advertising or romotional uroses, creating new collective works for resale or redistribution to servers or lists, or reuse of any coyrighted comonents of this work in other works. Reuse Unless indicated otherwise, fulltext items are rotected by coyright with all rights reserved. The coyright excetion in section 29 of the Coyright, Designs and Patents Act 988 allows the making of a single coy solely for the urose of non-commercial research or rivate study within the limits of fair dealing. The ublisher or other rights-holder may allow further reroduction and re-use of this version - refer to the White Rose Research Online record for this item. Where records identify the ublisher as the coyright holder, users can verify any secific terms of use on the ublisher s website. Takedown If you consider content in White Rose Research Online to be in breach of UK law, lease notify us by ing erints@whiterose.ac.uk including the URL of the record and the reason for the withdrawal request. erints@whiterose.ac.uk htts://erints.whiterose.ac.uk/

2 Secure D2D Communication in Large-Scale Cognitive Cellular Networks with Wireless Power Transfer Yuanwei Liu, Lifeng Wang, Syed Ali Raza Zaidi, Maged Elkashlan, and Trung Q. Duong Queen Mary University of London, London, UK University of Leeds, Leeds, UK Queen s University Belfast, Belfast, UK Abstract In this aer, we investigate secure device-to-device D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equied ower beacons PBs), and communicates with the corresonding receiver using the sectrum of the cellular base stations BSs). We introduce a ower transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the ower transfer model, we roose a new ower transfer olicy, namely, best ower beacon BPB) ower transfer. To characterize the ower transfer reliability of the roosed olicy, we derive new closed-form exressions for the exact ower outage robability and the asymtotic ower outage robability with large antenna arrays at PBs. In the information signal model, we resent a new comarative framework with two receiver selection schemes: ) best receiver selection BRS), and 2) nearest receiver selection NRS). To assess the secrecy erformance, we derive new exressions for the secrecy throughut considering the two receiver selection schemes using the BPB ower transfer olicies. We show that secrecy erformance imroves with increasing densities of PBs and D2D receivers because of a larger multiuser diversity gain. A ivotal conclusion is reached that BRS achieves better secrecy erformance than NRS but demands more instantaneous feedback and overhead. I. INTRODUCTION Wireless ower transfer WPT) has recently received significant attention for its attractive energy harvesting caabilities and rolonging the life-time of the wireless network []. The motivation behind it is the most devices surrounded by the ambient radio-frequency RF) signals which can carry energy and information together during transmission. Two ractical receiver designs namely time switching TS) receiver and ower slitting PS) receiver were roosed in a multileinut multile-outut MIMO) system in [2], which laid a solid foundation on the research of WPT. In [3], a new concet based on ower beacons PBs) that deloy dedicated ower stations to charge the nearby mobile devices with WPT was roosed. In [3], based on stochastic geometry, the ulink erformance in cellular networks was investigated under an outage constraint. Along with imroving the energy efficiency through energy harvesting [4], another key design objective is to maximize the sectral efficiency. Cognitive radio CR) [5] and deviceto-device D2D) technology [6], have rekindled the interest of researchers to achieve a more sectrally efficient cellular networks. In [7], a wireless ower transfer rotocol for a two-ho decode-and-forward relay system is roosed in a cognitive radio network. In [8], D2D communication in energy harvesting CR networks was roosed using stochastic geometry. Furthermore, it is currently noted that CR networks are also confronted with security issues since the broadcast nature of the wireless medium is suscetible to otential security threats such as eavesdroing and imersonation. Physical PHY) layer security, which is initialed by Wyner [9] and recently aroused wide-sread interest, has been considered in CR networks []. In [], the authors revealed the imact of the rimary network on the secondary network in the resence of a multi-antenna wireta channel and resented closed-form exressions for the exact and the asymtotic secrecy outage robability in cognitive secure communications. In this aer, we consider secure communication underlay cognitive cellular networks with an energy constrained D2D transmitter. A statistical model based on stochastic geometry is used to describe and evaluate the roosed D2D communication in energy harvesting large-scale cognitive cellular networks. Differing from [3] which neglects the small-scale fading and requires energy storage units at the mobile terminals, we deloy a battery-free design [2, 3] for the energy constrained D2D transmitter. Considering the imact of smallscale fading, we roose a new WPT olicy, namely, best ower beacon BPB) ower transfer, where the transmitter selects the PB with the strongest channel to harvest the energy. We also resent a new comarative framework with the best receiver selection BRS) and the nearest receiver selection NRS) schemes. For the roosed BPB, we derive a new closed-form exression for the ower outage robability. We also derive new analytical exressions for the secrecy throughut with BRS and NRS. Our analytical and numerical results show that BRS achieves higher secrecy throughut than NRS at the cost of more instantaneous feedback and overhead. A. Network Descrition II. NETWORK MODEL We consider secure cognitive D2D communication in cellular networks, where the energy constrained D2D transmitter Alice) communicates with D2D receivers Bobs) under

3 Y meters) Alice X meters) 8 Fig.. An examle of a art of a network snashot considering that the satial distributions of PBs ink diamonds), Bobs emty circles), BSs blue five-ointed stars), and Eves red stars) follow homogeneous oisson oint rocesses PPP). malicious attemt of D2D eavesdroers Eves). The eavesdroers are assive and interret the signal without trying to modify it. It is assumed that Alice is energy constrained, i.e., the transmission can only be scheduled by utilizing ower harvested from PBs. The satial toology of all PBs, cellular base stations BSs), Bobs, and Eves, are modeled using homogeneous oisson oint rocess PPP) Φ, Φ l, Φ b, and Φ e with density λ, λ l, λ b, and λ e, resectively. As shown in Fig., we consider that Alice is located at the origin in a two-dimensional lane. For Alice, Bob, and Eve, each node is equied with a single antenna. Each PB is furnished with M antennas and maximal ratio transmission MRT) is emloyed at PBs to erform WPT to the energy constrained Alice. All channels are assumed to be quasi-static fading channels where the channel coefficients are constant for each transmission block but vary indeendently between different blocks. In this network, we assume that the time of each frame is T, which includes two time slots: ) ower transfer time slot, in which Alice harvests the ower from PBs during the β)t time, with β being the fraction of the information rocessing time; and 2) information rocessing time slot, in which Alice transmits the information signal to the corresonding Bob using the harvested energy during the βt time. B. Power Transfer Model We consider a simle yet efficient ower transfer model. It is assumed that PBs oerate on a frequency band which is isolated from the communication band where BSs and D2D transceivers schedule their transmission. Secifically, the ower transmitted by PBs does not interfere with the cellular and D2D communication. We also consider that Alice is a battery-free user, which means that there is no battery storage energy for future use and all the harvested energy during the ower transfer time slot is used to transmit the information signal [2, 3]. We roose a new best ower beacon BPB) ower transfer olicy in the ower transfer model, where Alice selects the strongest PB to harvest energy. The harvested energy of Alice from the PB can be obtained as follows E H = ηp S max h 2 Lr ) β)t, ) where η is the ower conversion efficiency of the receiver, P S is the transmit ower of PBs. Here, h is C M vector, whose entries are indeendent comlex Gaussian distributed with zero mean and unit variance emloyed to cature the effect of small-scale fading between PBs and Alice. Lr ) = Kr α is the ower-law ath-loss exonent. The ath-loss function deends on the distance r, a frequency deendent constant K, and an environment/terrain deendent ath-loss exonent α 2. All the channel gains are assumed to be indeendent and identically distributed i.i.d.). Based on ), the maximum transmit ower at Alice is given by P H = max h 2 Lr ) C. Information Signal Model ηps β). 2) β We consider the cognitive underlay scheme [4], and assume that the instantaneous CSI of the links between Alice and cellular BSs are available at Alice. Consequently, the transmit ower P A at Alice is strictly constrained by the maximum transmit ower P t at Alice and the eak interference ower I at cellular BSs according to P A = min max l Φ l I,P t h l 2 Lr l ), 3) where h l 2 Lr l ) is the overall channel gain from Alice to the BS l. Here, h l is the small-scale fading coefficient with h l CN,) and Lr l ) = Kr α l is the ower-law athloss exonent. The ath-loss function deends on the distance r l. All the channel gains are assumed to be i.i.d.. For D2D communication, we consider two receiver selection schemes. ) Best Receiver Selection BRS) scheme: Under BRS, Alice selects one Bob with the strongest channel as the desired receiver. The instantaneous signal-to-noise ratio SNR) at the selected Bob is exressed as γ B = P A max h b 2 Lr b ) N b Φ b = ζmax h b 2 Lr b ), 4) γ whereζ = min max h l 2 Lr l ), γ,n is the noise ower, l Φ l γ = I /N, γ = P t /N, h b 2 Lr b ) is the channel ower gain between Alice and Bobs, h b is the small-scale fading coefficient with h b CN,), r b is the distance between Alice and Bobs.

4 2) Nearest Receiver Selection NRS) scheme: Under NRS, Alice selects the nearest Bob as the desired receiver. The advantage of this scheme is that it reduces the system comlexity since no instantaneous CSI and feedback from Bobs are required. Then the instantaneous SNR at the selected Bob can be exressed as γ B = P A N h b 2 max Lr b ) = ζ h b 2 max Lr b ), 5) where h b is the small-scale fading coefficient of Alice to the nearest Bob with h b CN,). For the eavesdroers, the instantaneous SNR at the most detrimental eavesdroer that has the strongest SNR between itself and Alice is exressed as γ E = P A max N e Φ e = ζmax h e 2 Lr e ) e Φ e h e 2 Lr e ), 6) where h e CN,), r e is the distance between Alice and Eves. III. POWER OUTAGE PROBABILITY We assume there exists a threshold transmit owerp t, below which the transmission cannot be scheduled, the transmission cannot be scheduled and Alice is considered to be in a ower limited regime. In order to characterize the ower limited regime of Alice, we introduce ower outage robability, i.e., robability that the harvested ower is not sufficient to carry out the transmission at a certain desired quality-of-service QoS) level. The objective of this section is to quantify the ower outage robability using BPB olicy. In ractical scenario, we exect a constant ower for the information transmission. Therefore, we also denote the ower threshold P t as the transmit ower of Alice when erforming information transmission to Bobs. A. Exact Analysis for Power Transfer In this subsection, we rovide exact analysis for the roosed BPB ower transfer olicy. In this olicy, only the PB with the strongest channel transfers ower to Alice. Theorem : The ower outage robability of BPB olicy can be exressed in closed-form as λπ µ H out = e M m= Γm+) m! ), 7) βp where µ = t ηp S K β), = 2/α, and Γ.) is Gamma function. Proof: Based on 2), the ower outage robability of BPB olicy can be exressed as PrP H P t = Pr max h 2 α r µ = E Φ Pr h 2 r α µ = E Φ F h 2 r α µ), 8) where F h 2 is the CDF of h 2 and is exressed as M ) F h 2 x) = x m e x. 9) m! m= Alying the generating functional given by [5], we rewrite 8) as ] H out = ex [ λ F h 2 r α µ) )dr. ) R 2 Then changing to olar coordinates and substituting 9) into ), the ower outage robability of BPB is given by [ M µ m r mα+ e r αµ ] dr H out = ex 2πλ. m! m= ) Then alying [6, Eq )] and calculating the integral in ), we obtain the closed form exression in 7). B. large antenna array analysis for Power Transfer In this subsection, we resent large antenna array analysis for ower transfer. We first examine the distribution of h 2 when M. Since h 2 is i.i.d. exonential random variables RVs), using law of large numbers, we have h 2 a.s. M, 2) where a.s. denotes the almost sure convergence. Theorem 2: The ower outage robability of large antenna array analysis for the BPB ower transfer olicy is given by H large out βp t MηP S K β). = e λπ θ, 3) where θ = Proof: The ower outage robability of BPB for large antenna arrays analysis can be exressed as ), 4) H large out = PrP H P t = F r α θ where F r is the cumulative distribution function CDF) of r and can be exressed as F r x) = x f r )dr = e λ πx 2, 5) where r reresenting the distance from the nearest PB to Alice and its robability density function PDF) is given by f r ) = 2λ πr e λπr2. Substituting 5) into 4), we obtain 3).

5 IV. SECRECY THROUGHPUT In this section, a comarative framework is resented with two receiver selection schemes, namely, best receiver selection scheme and nearest receiver selection scheme. We use secrecy throughut as a metric to characterize the secrecy erformance. A. New Statistics Theorem 3: The PDF of ζ = P A N is given by ωl x )e ) ω l x γ γ f ζ x) =, < x < γ, 6) γ Diracx γ ),x γ e ωl γ where ω l = K πλ l Γ), Dirac ) is the Dirac delta function. Proof: See Aendix A. Theorem 4: For BRS scheme, the CDF of γ B conditioned on ζ is given by F γb ζ z) = e ω B ζ z, 7) where ω B = K πλ b Γ). For NRS scheme, the CDF of γ B conditioned on ζ is given by F γb ζ z) = 2λ b π r b e λ bπr 2 b z Kζ rα b dr b. 8) Proof: See Aendix B. Similar to 7), we can obtain the CDF of γ E conditioned on ζ as where ω E = K 2 πλ e Γ). F γe ζ z) = e ω E ζ z, 9) B. Best Receiver Selection BRS) scheme In this scheme, the instantaneous secrecy rate is defined as C BRS s = [log 2 +γ B ) log 2 +γ E )] +, 2) where [x] + = maxx,. The secrecy throughut is the average of the instantaneous secrecy rate Cs BRS over γ B and γ E. As such, the secrecy throughut using BPB ower transfer olicy is given by C BRS s = H out ) β F γe ζ x 2 ) ln2 +x 2 F γb ζ x 2 ) ) f ζ x )dx 2 dx. 2) where F γb and F γe can be obtained in 7) and 9), searately, H out is the ower outage robability in the ower transfer model. Substituting 6), 7), and 9) into 2), after some maniulation, the secrecy throughut is derived as 22) on the to ) of next age, where Q 2 = ω E x 2 + ω l γ and Q 3 = ωb x 2 + ω E x 2 + ω l γ. C. Nearest Receiver Selection NRS) Scheme In this scheme, the instantaneous secrecy rate is defined as C NRS s = [log 2 +γ B ) log 2 +γ E )] +. 23) As such, the secrecy throughut is given by C NRS s = H out ) β F γe ζ x 2 ) ln2 +x 2 F γb ζ x 2 ) ) f ζ x )dx 2 dx. 24) Substituting 6), 8), and 9) into 24), we can obtain the secrecy throughut of NRS scheme. V. NUMERICAL RESULTS In this section, reresentative numerical results are resented to illustrate erformance evaluations including ower outage robability secrecy throughut for BPB ower transfer olicy in the ower transfer model and two receiver selection schemes in the information signal model. In the considered network, we set the transmit ower of PBs as P S = 43 dbm. The carrier frequency for ower transfer and information transmission is set as 8 MHz and 9 MHz resectively. Furthermore, the bandwidth of the information transmission signal is assumed to be MHz and the information receiver noise is assumed to be white Gaussian noise with average ower -55dBm. In addition, we assume that the energy conversion efficiency of WPT is η =.8. In each figure, we see recise agreement between the Monte Carlo simulation oints marked as and the analytical curves, which validates our derivation. Fig. 2 lots the ower outage robability versus density of PBs with different ower threshold P t. The black solid curve, reresenting the BPB olicy, is obtained from 7). We observe that as density of PBs increases, the ower outage robability dramatically decreases. This is because the multiuser diversity gain is imroved with increasing number of PBs when charging with WPT. We also see that as the ower threshold increases, the outage occurs more frequently. Fig. 3 lots the ower outage robability versus M of PBs using the exact analysis and the large antenna array analysis. The dashed curve, reresenting the large antenna array analysis of BPB is obtained from 3). We see that the ower outage robability decreases with increasing M. This is because larger antenna array gain is achieved with increasing M. As M increases, the large antenna array analysis and the exact analysis have recise agreement. This is due to the fact that when M grows large, the effect of small-scale fading is averaged out. Fig. 4 lots the secrecy throughut versus density of the receivers. The solid and dashed curves, reresenting the BRS and NRS schemes, are obtained from 22) and 24), searately. Several observations are drawn as follows: ) the secrecy throughut increases with increasing density of Bobs, this is because multiuser diversity gain is imroved with increasing number of Bobs; 2) the secrecy throughut also increases with number of antennas at PBs M since lower ower outage

6 C s BRS = H out ) β ln2 ω l γ +x 2 ) e γ + Q 2 Q 3 Q 3 Q 3 e γ Q 2 Q 2 l γ )+ e ω γ ωe γ x 2 +x 2 ωb γ x e 2 ) dx 2. 22) Analytical Simulation Pt =,5, dbm) 2 Density of PBs Secrecy throughut bits/s/hz) BRS NRS Simulation M =2,8,32 2 Density of Bobs Fig. 2. Power outage robability versus density of PBs with M = 32, P S = 43 dbm, P t = dbm, and β =.5. Fig. 4. Secrecy throughut versus density of Bobs λ b with different M, where P S = 43 dbm, P t = dbm, β =.5, λ =,λ e = 3, and λ l = 3. Power outage robability Exact analytical Large analytical Large simulation M Fig. 3. Power outage robability versus M for large antenna array analysis with P S = 43 dbm, P t = dbm, and β =.5. robability is achieved with larger antenna array gain, which results in imroving secrecy throughut; and 3) BRS achieves better secrecy erformance than NRS but demands more instantaneous feedbacks and overheads. Fig. 5 shows the secrecy throughut versus P t and β for BRS and NRS schemes using BPB ower transfer olicy. We see that β and P t have joint effects on the secrecy throughut. By jointly considering β and P t, we observe that there exits an otimal value for each of these two receiver selection schemes. This behavior is exlained as follows: ) as β increases, the time for ower transfer decreases and the transmitter receives less ower, but the time for information transmission increases; and 2) on the one hand, the ower outage robability increases with increasing ower threshold. On the other hand, the transmit ower of Alice also increases since the ower threshold is the transmit ower of Alice, which results in a lower ower outage robability. As such, there exits a tradeoff between the ower outage robability and the transmit ower. In this case, it is of significance to select a suitable P t and β to transmit information to maximize the secrecy throughut. These results rovide us guidelines when roceeding the system arameters in the networks. VI. CONCLUSIONS In this aer, secure transmission in large-scale cognitive cellular networks with an energy constrained device-to-device transmitter was considered. We roosed a novel wireless ower transfer olicy in the ower transfer model, namely, best ower beacon ower transfer. We also considered best receiver selection and nearest receiver selection schemes in the information signal model. We used stochastic geometry

7 Average secrecy throughut bits/s/hz) Pt dbm) 5.5 β a) BRS scheme.5..5 Average secrecy throughut bits/s/hz) Pt dbm) 5.5 β b) NRS scheme Fig. 5. Secrecy throughut of BRS and NRS versus β and ower threshold P t, with M = 32, P S = 43 dbm, λ =,λ b = 2,λ e = 3, and λ l = 3. aroach to rovide a comlete framework to model, analyze, and evaluate the erformance of the roosed network. New analytical exressions in terms of ower outage robability and secrecy throughut are derived to determine the system security erformance. Numerical results were resented to verify our analysis and rovide useful insights into ractical design. We concluded that by carefully setting the network design arameters, along with wireless ower transfer, an accetable secure transmission can be achieved in device-todevice networks without affecting the base stations. APPENDIX A: PROOF OF THEOREM 3 We comute the CDF of ζ as follows: F ζ x) = Prζ x = Pr min γ, γ max h l 2 Lr l ) x l Φ l γ = Pr max h l 2 Lr l ) max l Φ l x, γ γ +Pr max h l 2 Lr l ) γ, γ x l Φ l γ, γ x = Pr max h l 2 Lr l ) γ, γ > x. A.) l Φ l x G l Following the similar rocedure getting 7), we obtain G l as πλl G l = e K Γ)x γ. A.2) Substituting A.2) into A.), we obtain, γ x F ζ x) = πλl e K Γ)x γ, γ > x πλl = U γ x)e K Γ)x γ, A.3),x > where Ux) is the unit ste function as Ux) =,x. By taking the derivative of F ζ x) in A.3), we obtain the PDF of ζ in 6) APPENDIX B: PROOF OF THEOREM 4 The CDF of γ B conditioned on ζ is given by F γb ζ z) = Prγ B z = Pr max h b 2 Lr b ) ζ z. B.) Following the similar rocedure getting A.2), we obtain 7). The CDF of γ B conditioned on ζ is given by F γb ζ z) = Prγ B z = Pr h b 2 rα b z Kζ ) α = e r b z Kζ f r b )dr b = 2λ b π r b e λ bπr 2 b z Kζ rα b dr b, B.2) wherer b reresents the distance form the nearest Bob to Alice with the PDF given by f r b ) = 2λ b πr b e λ bπr 2 b. Thus, we can obtain 8). REFERENCES [] T. Le, K. Mayaram, and T. Fiez, Efficient far-field radio frequency energy harvesting for assively owered sensor networks, IEEE J. Solid-State Circuits, vol. 43, no. 5, , 28. [2] R. Zhang and C. K. Ho, MIMO broadcasting for simultaneous wireless information and ower transfer, IEEE Trans. Commun., vol. 2, no. 5, , 23. [3] K. Huang and V. Lau, Enabling wireless ower transfer in cellular networks: architecture, modeling and deloyment, IEEE Trans. Wireless Commun., vol. 3, no. 2, , 24. [4] D. Liu, Y. Chen, K. K. Chai, and T. Zhang, Otimal user association for delay-ower tradeoffs in hetnets with hybrid energy sources, In Proc. IEEE 25th Annual International Symosium on Personal, Indoor, and Mobile Radio Communications PIMRC), Washington, DC, USA 24. [5] A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, Breaking sectrum gridlock with cognitive radios: An information theoretic ersective, Proceedings of the IEEE, vol. 97, no. 5, , 29. [6] K. Doler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl, Deviceto-device communication as an underlay to LTE-advanced networks, IEEE Commun. Mag., vol. 47, no. 2, , 29. [7] S. A. Mousavifar, Y. Liu, C. Leung, M. Elkashlan, and T. Q. Duong, Wireless energy harvesting and sectrum sharing in cognitive radio, in in Proc. IEEE Vehicular Technology Conference VTC Fall), 8th, 24,. 5. [8] A. H. Sakr and E. Hossain, Cognitive and energy harvesting-based D2D communication in cellular networks: Stochastic geometry modeling and analysis, htt://arxiv.org/abs/45.23, 24. [9] A. D. Wyner, The wire-ta channel, Bell Syst. Tech. J., vol. 54, no. 8, , 975. [] Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, and K. H. Li, Secure communication over MISO cognitive radio channels, IEEE Trans. Wireless Commun., vol. 9, no. 4, , 2. [] M. Elkashlan, L. Wang, T. Q. Duong, G. K. Karagiannidis, and A. Nallanathan, On the security of cognitive radio networks, Acceted by IEEE Trans. Veh. Technol., 24. [2] I. Krikidis, S. Sasaki, S. Timotheou, and Z. Ding, A low comlexity antenna switching for joint wireless information and energy transfer in mimo relay channels, IEEE Trans. Commun., 24. [3] Y. Liu, L. Wang, M. Elkashlan, T. Q. Duong, and A. Nallanathan, Two-way relaying networks with wireless ower transfer: Policies design and throughut analysis, In Proc. IEEE Global Commun. Conf. GLOBECOM), Austin Texas, USA 24. [4] S. A. R. Zaidi, D. C. McLernon, and M. Ghogho, Breaking the area sectral efficiency wall in cognitive underlay networks, IEEE J. Sel. Areas Commun., vol. 32, no., 24. [5] W. K. D. Stoyan and J. Mecke, Stochastic Geometry and its Alications, 2nd ed. John Wiley and Sons, 996. [6] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 6th ed. New York, NY, USA: Academic Press, 2.

Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model

Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model Yuanwei Liu, Lifeng Wang, Syed Ali Raza Zaidi, Maged Elkashlan, and Trung Q. Duong Abstract In this

More information

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 1, JANUARY

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 1, JANUARY IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 1, JANUARY 16 39 Secure DD Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model Yuanwei Liu, Student Member, IEEE,

More information

Operating Characteristics of Underlay Cognitive Relay Networks

Operating Characteristics of Underlay Cognitive Relay Networks Oerating Characteristics of Underlay Cognitive Relay Networks Ankit Kaushik, Ralh Tanbourgi, Friedrich Jondral Communications Engineering Lab Karlsruhe Institute of Technology (KIT) {Ankit.Kaushik, Ralh.Tanbourgi,

More information

Decorrelation distance characterization of long term fading of CW MIMO channels in urban multicell environment

Decorrelation distance characterization of long term fading of CW MIMO channels in urban multicell environment Decorrelation distance characterization of long term fading of CW MIMO channels in urban multicell environment Alayon Glazunov, Andres; Wang, Ying; Zetterberg, Per Published in: 8th International Conference

More information

Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation

Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation International Journal Of Comutational Engineering Research (ijceronline.com) Vol. 2 Issue. Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation Rajbir Kaur 1, Charanjit

More information

Performance Analysis of MIMO System using Space Division Multiplexing Algorithms

Performance Analysis of MIMO System using Space Division Multiplexing Algorithms Performance Analysis of MIMO System using Sace Division Multilexing Algorithms Dr.C.Poongodi 1, Dr D Deea, M. Renuga Devi 3 and N Sasireka 3 1, Professor, Deartment of ECE 3 Assistant Professor, Deartment

More information

Fig.1channel model of multiuser ss OSTBC system

Fig.1channel model of multiuser ss OSTBC system IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. V (Feb. 2014), PP 48-52 Cooperative Spectrum Sensing In Cognitive Radio

More information

Antenna Selection Scheme for Wireless Channels Utilizing Differential Space-Time Modulation

Antenna Selection Scheme for Wireless Channels Utilizing Differential Space-Time Modulation Antenna Selection Scheme for Wireless Channels Utilizing Differential Sace-Time Modulation Le Chung Tran and Tadeusz A. Wysocki School of Electrical, Comuter and Telecommunications Engineering Wollongong

More information

A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game

A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game A Pricing-Based Cooerative Sectrum Sharing Stackelberg Game Ramy E. Ali, Karim G. Seddik, Mohammed Nafie, and Fadel F. Digham? Wireless Intelligent Networks Center (WINC), Nile University, Smart Village,

More information

Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation

Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation Evolutionary Circuit Design: Theory Persective on Signal Proagation Denis Poel Deartment of Comuter Science, Baker University, P.O. 65, Baldwin City, KS 66006, E-mail: oel@ieee.org Nawar Hakeem Deartment

More information

/11/$ IEEE

/11/$ IEEE This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 0 proceedings. Two-way Amplify-and-Forward MIMO Relay

More information

High resolution radar signal detection based on feature analysis

High resolution radar signal detection based on feature analysis Available online www.jocr.com Journal of Chemical and Pharmaceutical Research, 4, 6(6):73-77 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 High resolution radar signal detection based on feature

More information

Performance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices

Performance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices Performance Analysis of Battery Power Management Schemes in Wireless Mobile Devices Balakrishna J Prabhu, A Chockalingam and Vinod Sharma Det of ECE, Indian Institute of Science, Bangalore, INDIA Abstract

More information

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Xiuying Chen, Tao Jing, Yan Huo, Wei Li 2, Xiuzhen Cheng 2, Tao Chen 3 School of Electronics and Information Engineering,

More information

Efficient Importance Sampling for Monte Carlo Simulation of Multicast Networks

Efficient Importance Sampling for Monte Carlo Simulation of Multicast Networks Efficient Imortance Samling for Monte Carlo Simulation of Multicast Networks P. Lassila, J. Karvo and J. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P.O.Box 3000,

More information

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

This is a repository copy of A simulation based distributed MIMO network optimisation using channel map.

This is a repository copy of A simulation based distributed MIMO network optimisation using channel map. This is a repository copy of A simulation based distributed MIMO network optimisation using channel map. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/94014/ Version: Submitted

More information

Transmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1

Transmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Transmitter Antenna Diversity and Adative Signaling Using ong Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Shengquan Hu, Tugay Eyceoz, Alexandra Duel-Hallen North Carolina State University

More information

Two-Way Relay Networks with Wireless Power Transfer: Design and Performance Analysis

Two-Way Relay Networks with Wireless Power Transfer: Design and Performance Analysis Two-Way Relay Networks with Wireless Power Transfer: Design and Performance nalysis ELKSHLN, M The final publication is available at http://digitallibrary.theiet.org/content/journals/1.149/iet-com.215.728

More information

arxiv: v1 [eess.sp] 10 Apr 2018

arxiv: v1 [eess.sp] 10 Apr 2018 Sensing Hidden Vehicles by Exloiting Multi-Path V2V Transmission Kaifeng Han, Seung-Woo Ko, Hyukjin Chae, Byoung-Hoon Kim, and Kaibin Huang Det. of EEE, The University of Hong Kong, Hong Kong LG Electronics,

More information

Optimal Energy Harvesting Scheme for Power Beacon-Assisted Wireless-Powered Networks

Optimal Energy Harvesting Scheme for Power Beacon-Assisted Wireless-Powered Networks Indonesian Journal of Electrical Engineering and Computer Science Vol. 7, No. 3, September 2017, pp. 802 808 DOI: 10.11591/ijeecs.v7.i3.pp802-808 802 Optimal Energy Harvesting Scheme for Power Beacon-Assisted

More information

Properties of Mobile Tactical Radio Networks on VHF Bands

Properties of Mobile Tactical Radio Networks on VHF Bands Proerties of Mobile Tactical Radio Networks on VHF Bands Li Li, Phil Vigneron Communications Research Centre Canada Ottawa, Canada li.li@crc.gc.ca / hil.vigneron@crc.gc.ca ABSTRACT This work extends a

More information

Product Accumulate Codes on Fading Channels

Product Accumulate Codes on Fading Channels Product Accumulate Codes on Fading Channels Krishna R. Narayanan, Jing Li and Costas Georghiades Det of Electrical Engineering Texas A&M University, College Station, TX 77843 Abstract Product accumulate

More information

Full/Half-Duplex Relay Selection for Cooperative NOMA Networks

Full/Half-Duplex Relay Selection for Cooperative NOMA Networks Full/Half-Duplex Relay Selection for Cooperative NOMA Networks Xinwei Yue, Yuanwei Liu, Rongke Liu, Arumugam Nallanathan, and Zhiguo Ding Beihang University, Beijing, China Queen Mary University of London,

More information

2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 200 IEEE. Personal use of this material is ermitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including rerinting/reublishing this material for advertising

More information

Statistical Evaluation of the Azimuth and Elevation Angles Seen at the Output of the Receiving Antenna

Statistical Evaluation of the Azimuth and Elevation Angles Seen at the Output of the Receiving Antenna IEEE TANSACTIONS ON ANTENNAS AND POPAGATION 1 Statistical Evaluation of the Azimuth and Elevation Angles Seen at the Outut of the eceiving Antenna Cezary Ziółkowski and an M. Kelner Abstract A method to

More information

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 3, MARCH

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 3, MARCH IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 3, MARCH 13 951 SHARP: Sectrum Harvesting with ARQ Retransmission and Probing in Cognitive Radio James C. F. Li, Member, IEEE, Wei Zhang, Senior Member,

More information

This is a repository copy of Wideband outdoor MIMO channel model derived from directional channel measurements at 2 GHz.

This is a repository copy of Wideband outdoor MIMO channel model derived from directional channel measurements at 2 GHz. his is a reository coy of Wideband outdoor MIMO channel model derived from directional channel measurements at GHz. White Rose Research Online URL for this aer: htt://erints.whiterose.ac.uk/479/ Version:

More information

Analysis of massive MIMO networks using stochastic geometry

Analysis of massive MIMO networks using stochastic geometry Analysis of massive MIMO networks using stochastic geometry Tianyang Bai and Robert W. Heath Jr. Wireless Networking and Communications Group Department of Electrical and Computer Engineering The University

More information

Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes

Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes 22 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes Amy Fu and Parastoo Sadeghi The Australian National

More information

An Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System

An Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System RESEARCH ARTICLE OPEN ACCESS An Overview of PAPR Reduction Otimization Algorithm for MC-CDMA System Kanchan Singla*, Rajbir Kaur**, Gagandee Kaur*** *(Deartment of Electronics and Communication, Punjabi

More information

Performance Analysis of Multiuser MIMO Systems with Scheduling and Antenna Selection

Performance Analysis of Multiuser MIMO Systems with Scheduling and Antenna Selection Performance Analysis of Multiuser MIMO Systems with Scheduling and Antenna Selection Mohammad Torabi Wessam Ajib David Haccoun Dept. of Electrical Engineering Dept. of Computer Science Dept. of Electrical

More information

A Fine-Grained Analysis of Millimeter-Wave Device-to-Device Networks

A Fine-Grained Analysis of Millimeter-Wave Device-to-Device Networks A Fine-Grained Analysis of Millimeter-Wave Device-to-Device Networks Na Deng and Martin Haenggi, Fellow, IEEE Abstract Enabling device-to-device DD communications in millimeter-wave mm-wave networks is

More information

arxiv: v2 [cs.it] 29 Mar 2014

arxiv: v2 [cs.it] 29 Mar 2014 1 Spectral Efficiency and Outage Performance for Hybrid D2D-Infrastructure Uplink Cooperation Ahmad Abu Al Haija and Mai Vu Abstract arxiv:1312.2169v2 [cs.it] 29 Mar 2014 We propose a time-division uplink

More information

Quantum Limited DPSK Receivers with Optical Mach-Zehnder Interferometer Demodulation

Quantum Limited DPSK Receivers with Optical Mach-Zehnder Interferometer Demodulation Quantum Limited DPSK Receivers with Otical Mach-Zehnder Interferometer Demodulation Xiuu Zhang, Deartment of Electrical and Comuter Engineering, Concordia University, Montreal, Quebec, CANADA, E-mail:

More information

Initial Ranging for WiMAX (802.16e) OFDMA

Initial Ranging for WiMAX (802.16e) OFDMA Initial Ranging for WiMAX (80.16e) OFDMA Hisham A. Mahmoud, Huseyin Arslan Mehmet Kemal Ozdemir Electrical Engineering Det., Univ. of South Florida Logus Broadband Wireless Solutions 40 E. Fowler Ave.,

More information

FOUNTAIN codes [1], [2] have been introduced to achieve

FOUNTAIN codes [1], [2] have been introduced to achieve Controlled Flooding of Fountain Codes Waqas bin Abbas, Paolo Casari, Senior Member, IEEE, Michele Zorzi, Fellow, IEEE Abstract We consider a multiho network where a source node must reliably deliver a

More information

Analysis of Multi-tier Uplink Cellular Networks with Energy Harvesting and Flexible Cell Association

Analysis of Multi-tier Uplink Cellular Networks with Energy Harvesting and Flexible Cell Association Analysis of Multi-tier Uplin Cellular Networs with Energy Harvesting and Flexible Cell Association Ahmed Hamdi Sar and Eram Hossain Abstract We model and analyze a K-tier uplin cellular networ with flexible

More information

Joint Adaptive Modulation and Diversity Combining with Feedback Error Compensation

Joint Adaptive Modulation and Diversity Combining with Feedback Error Compensation Joint Adaptive Modulation and Diversity Combining with Feedback Error Compensation Seyeong Choi, Mohamed-Slim Alouini, Khalid A. Qaraqe Dept. of Electrical Eng. Texas A&M University at Qatar Education

More information

Interference Management via Sliding-Window Superposition Coding

Interference Management via Sliding-Window Superposition Coding Globecom 24 Worksho - Emerging Technologies for 5G Wireless Cellular Networks Interference Management via Sliding-Window Suerosition Coding Hosung ark, Young-Han Kim, Lele Wang University of California,

More information

ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM

ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM Kaushal Patel 1 1 M.E Student, ECE Deartment, A D Patel Institute of Technology, V. V. Nagar, Gujarat, India ABSTRACT Today, in

More information

Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference

Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Matti Hämäläinen, Raffaello Tesi, Veikko Hovinen, Niina Laine, Jari Iinatti Centre for Wireless Communications, University

More information

Capacity Analysis of Multicast Network in Spectrum Sharing Systems

Capacity Analysis of Multicast Network in Spectrum Sharing Systems Capacity Analysis of Multicast Network in Spectrum Sharing Systems Jianbo Ji*, Wen Chen*#, Haibin Wan*, and Yong Liu* *Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai,.R, China

More information

Capacity Gain From Two-Transmitter and Two-Receiver Cooperation

Capacity Gain From Two-Transmitter and Two-Receiver Cooperation 3822 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Caacity Gain From Two-Transmitter and Two-Receiver Cooeration Chris T. K. Ng, Student Member, IEEE, Nihar Jindal, Member, IEEE,

More information

Adaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach

Adaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach Adative Switching between Satial Diversity and ultilexing: a Cross-layer Aroach José Lóez Vicario and Carles Antón-Haro Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) c/ Gran Caità -4, 08034

More information

On Multiple Users Scheduling Using Superposition Coding over Rayleigh Fading Channels

On Multiple Users Scheduling Using Superposition Coding over Rayleigh Fading Channels On Multiple Users Scheduling Using Superposition Coding over Rayleigh Fading Channels Item Type Article Authors Zafar, Ammar; Alnuweiri, Hussein; Shaqfeh, Mohammad; Alouini, Mohamed-Slim Eprint version

More information

Modeling and Analysis of User-Centric and Disjoint Cooperation in Network MIMO Systems. Caiyi Zhu

Modeling and Analysis of User-Centric and Disjoint Cooperation in Network MIMO Systems. Caiyi Zhu Modeling and Analysis of User-Centric and Disjoint Cooperation in Network MIMO Systems by Caiyi Zhu A thesis submitted in conformity with the requirements for the degree of Master of Applied Science Graduate

More information

A New ISPWM Switching Technique for THD Reduction in Custom Power Devices

A New ISPWM Switching Technique for THD Reduction in Custom Power Devices A New ISPWM Switching Technique for THD Reduction in Custom Power Devices S. Esmaeili Jafarabadi, G. B. Gharehetian Deartment of Electrical Engineering, Amirkabir University of Technology, 15914 Tehran,

More information

On the feasibility of wireless energy transfer using massive antenna arrays in Rician channels

On the feasibility of wireless energy transfer using massive antenna arrays in Rician channels On the feasibility of wireless energy transfer using massive antenna arrays in Rician channels Salil Kashyap, Emil Björnson and Erik G Larsson The self-archived postprint version of this conference article

More information

An Overview of Substrate Noise Reduction Techniques

An Overview of Substrate Noise Reduction Techniques An Overview of Substrate Noise Reduction Techniques Shahab Ardalan, and Manoj Sachdev ardalan@ieee.org, msachdev@ece.uwaterloo.ca Deartment of Electrical and Comuter Engineering University of Waterloo

More information

Performance Analysis of LTE Downlink under Symbol Timing Offset

Performance Analysis of LTE Downlink under Symbol Timing Offset Performance Analysis of LTE Downlink under Symbol Timing Offset Qi Wang, Michal Šimko and Markus Ru Institute of Telecommunications, Vienna University of Technology Gusshausstrasse 25/389, A-1040 Vienna,

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

Uplink Scheduling in Wireless Networks with Successive Interference Cancellation

Uplink Scheduling in Wireless Networks with Successive Interference Cancellation 1 Ulink Scheduling in Wireless Networks with Successive Interference Cancellation Majid Ghaderi, Member, IEEE, and Mohsen Mollanoori, Student Member, IEEE, Abstract In this aer, we study the roblem of

More information

THRESHOLD-BASED PARALLEL MULTIUSER SCHEDULING

THRESHOLD-BASED PARALLEL MULTIUSER SCHEDULING The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 7 THRESHOLD-BASED PARALLEL MULTIUSER SCHEDULING Sung Sik Nam Dept of ECE College Station, Texas Email:

More information

Amplify-and-Forward Space-Time Coded Cooperation via Incremental Relaying Behrouz Maham and Are Hjørungnes

Amplify-and-Forward Space-Time Coded Cooperation via Incremental Relaying Behrouz Maham and Are Hjørungnes Amplify-and-Forward Space-Time Coded Cooperation via Incremental elaying Behrouz Maham and Are Hjørungnes UniK University Graduate Center, University of Oslo Instituttveien-5, N-7, Kjeller, Norway behrouz@unik.no,

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Author(s) Citation Relative hase noise estimation and mitigation in Raman amlified coherent otical communication

More information

Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks

Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO., DECEMBER 365 Primary User Enters the Game: Performance of Dynamic Sectrum Leasing in Cognitive Radio Networks Gonzalo Vazquez-Vilar, Student Member,

More information

PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY

PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY 1 MOHAMMAD RIAZ AHMED, 1 MD.RUMEN AHMED, 1 MD.RUHUL AMIN ROBIN, 1 MD.ASADUZZAMAN, 2 MD.MAHBUB

More information

Impact of Inaccurate User and Base Station Positioning on Autonomous Coverage Estimation

Impact of Inaccurate User and Base Station Positioning on Autonomous Coverage Estimation Imact of Inaccurate User and Base Station Positioning on Autonomous Coverage Estimation Iman Akbari, Oluwakayode Onireti, Ali Imran, Muhammad Ali Imran and ahim Tafazolli Institute for Communication Systems

More information

Joint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networks: A Divide-and-Conquer Approach

Joint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networks: A Divide-and-Conquer Approach Joint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networs: A Divide-and-Conquer Aroach Qingqing Wu, Meixia Tao, and Wen Chen Deartment of Electronic Engineering, Shanghai Jiao Tong University, Shanghai,

More information

JOINT COMPENSATION OF OFDM TRANSMITTER AND RECEIVER IQ IMBALANCE IN THE PRESENCE OF CARRIER FREQUENCY OFFSET

JOINT COMPENSATION OF OFDM TRANSMITTER AND RECEIVER IQ IMBALANCE IN THE PRESENCE OF CARRIER FREQUENCY OFFSET JOINT COMPENSATION OF OFDM TRANSMITTER AND RECEIVER IQ IMBALANCE IN THE PRESENCE OF CARRIER FREQUENCY OFFSET Deeaknath Tandur, and Marc Moonen ESAT/SCD-SISTA, KULeuven Kasteelark Arenberg 10, B-3001, Leuven-Heverlee,

More information

Opportunistic cooperation in wireless ad hoc networks with interference correlation

Opportunistic cooperation in wireless ad hoc networks with interference correlation Noname manuscript No. (will be inserted by the editor) Opportunistic cooperation in wireless ad hoc networks with interference correlation Yong Zhou Weihua Zhuang Received: date / Accepted: date Abstract

More information

An Adaptive Narrowband Interference Excision Filter with Low Signal Loss for GPS Receivers

An Adaptive Narrowband Interference Excision Filter with Low Signal Loss for GPS Receivers ICCAS5 An Adative Narrowband Filter with Low Signal Loss for GPS s Mi-Young Shin*, Chansik Park +, Ho-Keun Lee #, Dae-Yearl Lee #, and Sang-Jeong Lee ** * Deartment of Electronics Engineering, Chungnam

More information

Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems

Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems I TRANSACTIONS ON CIRCUITS AND SYTMS I: FUNDAMNTAL THORY AND APPLICATIONS, VOL. 50, NO., NOVMBR 2003 475 Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional

More information

The Transmission Capacity of Frequency-Hopping Ad Hoc Networks

The Transmission Capacity of Frequency-Hopping Ad Hoc Networks The Transmission Capacity of Frequency-Hopping Ad Hoc Networks Matthew C. Valenti Lane Department of Computer Science and Electrical Engineering West Virginia University June 13, 2011 Matthew C. Valenti

More information

Simultaneous Wireless Information and Power Transfer (SWIPT) in 5G Wireless Systems: Opportunities and Challenges

Simultaneous Wireless Information and Power Transfer (SWIPT) in 5G Wireless Systems: Opportunities and Challenges Simultaneous Wireless Information and Power Transfer (SWIPT) in 5G Wireless Systems: Opportunities and Challenges Shree Krishna Sharma 1, Nalin D. K. Jayakody 2, Symeon Chatzinotas 1 1 Interdisciplinary

More information

ISSN Vol.03,Issue.17 August-2014, Pages:

ISSN Vol.03,Issue.17 August-2014, Pages: www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.17 August-2014, Pages:3542-3548 Implementation of MIMO Multi-Cell Broadcast Channels Based on Interference Alignment Techniques B.SANTHOSHA

More information

Data-precoded algorithm for multiple-relayassisted

Data-precoded algorithm for multiple-relayassisted RESEARCH Oen Access Data-recoded algorithm for multile-relayassisted systems Sara Teodoro *, Adão Silva, João M Gil and Atílio Gameiro Abstract A data-recoded relay-assisted (RA scheme is roosed for a

More information

Self-Driven Phase Shifted Full Bridge Converter for Telecom Applications

Self-Driven Phase Shifted Full Bridge Converter for Telecom Applications Self-Driven Phase Shifted Full Bridge Converter for Telecom Alications SEVILAY CETIN Technology Faculty Pamukkale University 7 Kinikli Denizli TURKEY scetin@au.edu.tr Abstract: - For medium ower alications,

More information

Performance Evaluation of Dual Hop Multi-Antenna Multi- Relay System using Nakagami Fading Environment

Performance Evaluation of Dual Hop Multi-Antenna Multi- Relay System using Nakagami Fading Environment Performance Evaluation of Dual Hop Multi-Antenna Multi- Relay System using Environment Neha Pathak 1, Mohammed Ahmed 2, N.K Mittal 3 1 Mtech Scholar, 2 Prof., 3 Principal, OIST Bhopal Abstract-- Dual hop

More information

Throughput Analysis of the Two-way Relay System with Network Coding and Energy Harvesting

Throughput Analysis of the Two-way Relay System with Network Coding and Energy Harvesting IEEE ICC 7 Green Communications Systems and Networks Symposium Throughput Analysis of the Two-way Relay System with Network Coding and Energy Harvesting Haifeng Cao SIST, Shanghaitech University Shanghai,,

More information

Optimal Power Allocation over Fading Channels with Stringent Delay Constraints

Optimal Power Allocation over Fading Channels with Stringent Delay Constraints 1 Optimal Power Allocation over Fading Channels with Stringent Delay Constraints Xiangheng Liu Andrea Goldsmith Dept. of Electrical Engineering, Stanford University Email: liuxh,andrea@wsl.stanford.edu

More information

Wireless Powered Communication Networks: An Overview

Wireless Powered Communication Networks: An Overview Wireless Powered Communication Networks: An Overview Rui Zhang (e-mail: elezhang@nus.edu.sg) ECE Department, National University of Singapore (NUS) WCNC Doha, April 3 2016 Introduction Wireless Communication

More information

Performance Analysis of RAKE Receivers with Finger Reassignment

Performance Analysis of RAKE Receivers with Finger Reassignment Performance Analysis of RAKE Receivers with Finger Reassignment Seyeong Choi Dept. of Electrical & Computer Eng. Texas A&M University College Station, TX 77843, USA Email: yeong@ece.tamu.edu Mohamed-Slim

More information

THE rapid growth of mobile traffic in recent years drives

THE rapid growth of mobile traffic in recent years drives Optimal Deployment of mall Cell for Maximizing Average m Rate in Ultra-dense Networks Yang Yang Member IEEE Linglong Dai enior Member IEEE Jianjun Li Richard MacKenzie and Mo Hao Abstract In future 5G

More information

Approximated fast estimator for the shape parameter of generalized Gaussian distribution for a small sample size

Approximated fast estimator for the shape parameter of generalized Gaussian distribution for a small sample size BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 63, No. 2, 2015 DOI: 10.1515/basts-2015-0046 Aroximated fast estimator for the shae arameter of generalized Gaussian distribution for

More information

ISSN Vol.07,Issue.01, January-2015, Pages:

ISSN Vol.07,Issue.01, January-2015, Pages: ISSN 2348 2370 Vol.07,Issue.01, January-2015, Pages:0145-0150 www.ijatir.org A Novel Approach for Delay-Limited Source and Channel Coding of Quasi- Stationary Sources over Block Fading Channels: Design

More information

University of Twente

University of Twente University of Twente Faculty of Electrical Engineering, Mathematics & Comuter Science Design of an audio ower amlifier with a notch in the outut imedance Remco Twelkemeijer MSc. Thesis May 008 Suervisors:

More information

Wirelessly Powered Backscatter Communication Networks: Modeling, Coverage and Capacity

Wirelessly Powered Backscatter Communication Networks: Modeling, Coverage and Capacity Wirelessly Powered Backscatter Communication Networks: Modeling, Coverage and Capacity Kaifeng Han and Kaibin Huang Department of Electrical and Electronic Engineering The University of Hong Kong, Hong

More information

On the Optimum Power Allocation in the One-Side Interference Channel with Relay

On the Optimum Power Allocation in the One-Side Interference Channel with Relay 2012 IEEE Wireless Communications and etworking Conference: Mobile and Wireless etworks On the Optimum Power Allocation in the One-Side Interference Channel with Relay Song Zhao, Zhimin Zeng, Tiankui Zhang

More information

Secondary Transceiver Design in the Presence of Frequency Offset between OFDM-based Primary and Secondary Systems

Secondary Transceiver Design in the Presence of Frequency Offset between OFDM-based Primary and Secondary Systems Secondary Transceiver Design in the Presence of Frequency Offset between OFDM-based Primary and Secondary Systems Zhikun Xu and Chenyang Yang School of Electronics and Information Engineering, Beihang

More information

General Order Antenna Selection in MIMO Cooperative Relay Network

General Order Antenna Selection in MIMO Cooperative Relay Network General Order Antenna Selection in MIMO Cooperative Relay Network Arun K. Gurung, Fawaz S Al-Qahtani, Khalid A. Qaraqe, Hussein Alnuweiri, Zahir M. Hussain School of Electrical & Computer Engineering,

More information

An Alternative Single Parameter Functional Form for Lorenz Curve

An Alternative Single Parameter Functional Form for Lorenz Curve Crawford School of Public Policy Crawford School working aers An Alternative Single Parameter Functional Form for Lorenz Curve Crawford School Working Paer 7 Setember 07 Satya Paul Amrita University, India

More information

Random Beamforming with Multi-beam Selection for MIMO Broadcast Channels

Random Beamforming with Multi-beam Selection for MIMO Broadcast Channels Random Beamforming with Multi-beam Selection for MIMO Broadcast Channels Kai Zhang and Zhisheng Niu Dept. of Electronic Engineering, Tsinghua University Beijing 84, China zhangkai98@mails.tsinghua.e.cn,

More information

Coordinated Multi-Point (CoMP) Transmission in Downlink Multi-cell NOMA Systems: Models and Spectral Efficiency Performance

Coordinated Multi-Point (CoMP) Transmission in Downlink Multi-cell NOMA Systems: Models and Spectral Efficiency Performance 1 Coordinated Multi-Point (CoMP) Transmission in Downlink Multi-cell NOMA Systems: Models and Spectral Efficiency Performance Md Shipon Ali, Ekram Hossain, and Dong In Kim arxiv:1703.09255v1 [cs.ni] 27

More information

Source Transmit Antenna Selection for MIMO Decode-and-Forward Relay Networks

Source Transmit Antenna Selection for MIMO Decode-and-Forward Relay Networks IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 7, APRIL 1, 2013 1657 Source Transmit Antenna Selection for MIMO Decode--Forward Relay Networks Xianglan Jin, Jong-Seon No, Dong-Joon Shin Abstract

More information

Indirect Channel Sensing for Cognitive Amplify-and-Forward Relay Networks

Indirect Channel Sensing for Cognitive Amplify-and-Forward Relay Networks Indirect Channel Sensing for Cognitive Amlify-and-Forward Relay Networs Yieng Liu and Qun Wan Abstract In cognitive radio networ the rimary channel information is beneficial. But it can not be obtained

More information

Spectrum Sensing and Data Transmission Tradeoff in Cognitive Radio Networks

Spectrum Sensing and Data Transmission Tradeoff in Cognitive Radio Networks Spectrum Sensing Data Transmission Tradeoff in Cognitive Radio Networks Yulong Zou Yu-Dong Yao Electrical Computer Engineering Department Stevens Institute of Technology, Hoboken 73, USA Email: Yulong.Zou,

More information

Secondary Transmission Profile for a Single-band Cognitive Interference Channel

Secondary Transmission Profile for a Single-band Cognitive Interference Channel Secondary Transmission rofile for a Single-band Cognitive Interference Channel Debashis Dash and Ashutosh Sabharwal Department of Electrical and Computer Engineering, Rice University Email:{ddash,ashu}@rice.edu

More information

Joint Frame Design, Resource Allocation and User Association for Massive MIMO Heterogeneous Networks with Wireless Backhaul

Joint Frame Design, Resource Allocation and User Association for Massive MIMO Heterogeneous Networks with Wireless Backhaul IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL.XXX, NO.XXX, MONTH YEAR 1 Joint Frame Design, Resource Allocation and User Association for Massive MIMO Heterogeneous Networks with Wireless Backhaul Mingjie

More information

On the Performance of Cognitive Full-Duplex Relaying Systems under Spectrum Sharing Constraints

On the Performance of Cognitive Full-Duplex Relaying Systems under Spectrum Sharing Constraints On the Performance of Cognitive Full-Duplex Relaying Systems under Spectrum Sharing Constraints Samuel Baraldi Mafra, Hirley Alves, Daniel Benevides da Costa, Richard Demo Souza, Evelio M. G. Fernandez,

More information

IN RECENT years, wireless multiple-input multiple-output

IN RECENT years, wireless multiple-input multiple-output 1936 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 6, NOVEMBER 2004 On Strategies of Multiuser MIMO Transmit Signal Processing Ruly Lai-U Choi, Michel T. Ivrlač, Ross D. Murch, and Wolfgang

More information

A Cognitive Subcarriers Sharing Scheme for OFDM based Decode and Forward Relaying System

A Cognitive Subcarriers Sharing Scheme for OFDM based Decode and Forward Relaying System A Cognitive Subcarriers Sharing Scheme for OFM based ecode and Forward Relaying System aveen Gupta and Vivek Ashok Bohara WiroComm Research Lab Indraprastha Institute of Information Technology IIIT-elhi

More information

Energy Efficiency Optimization in Multi-Antenna Wireless Powered Communication Network with No Channel State Information

Energy Efficiency Optimization in Multi-Antenna Wireless Powered Communication Network with No Channel State Information Vol.141 (GST 016), pp.158-163 http://dx.doi.org/10.1457/astl.016.141.33 Energy Efficiency Optimization in Multi-Antenna Wireless Powered Communication Networ with No Channel State Information Byungjo im

More information

IEEE P Wireless Personal Area Networks. UWB Channel Model for under 1 GHz

IEEE P Wireless Personal Area Networks. UWB Channel Model for under 1 GHz Setember, 4 IEEE P85-4/55r Project Title Date Submitted Source Re: Abstract Purose Notice Release IEEE P85 Wireless Personal Area Networks IEEE P85 Working Grou for Wireless Personal Area Networks (WPANs)

More information

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Haobing Wang, Lin Gao, Xiaoying Gan, Xinbing Wang, Ekram Hossain 2. Department of Electronic Engineering, Shanghai Jiao

More information

Differentially Coherent Detection: Lower Complexity, Higher Capacity?

Differentially Coherent Detection: Lower Complexity, Higher Capacity? Differentially Coherent Detection: Lower Complexity, Higher Capacity? Yashar Aval, Sarah Kate Wilson and Milica Stojanovic Northeastern University, Boston, MA, USA Santa Clara University, Santa Clara,

More information

Propagation Channels. Chapter Path Loss

Propagation Channels. Chapter Path Loss Chapter 9 Propagation Channels The transmit and receive antennas in the systems we have analyzed in earlier chapters have been in free space with no other objects present. In a practical communication

More information

ISSN (Print) DOI: /sjet Original Research Article. *Corresponding author Rosni Sayed

ISSN (Print) DOI: /sjet Original Research Article. *Corresponding author Rosni Sayed DOI: 10.21276/sjet.2016.4.10.4 Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2016; 4(10):489-499 Scholars Academic and Scientific Publisher (An International Publisher for Academic

More information

An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks

An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems Research

More information