A Primary User Emulation Attack Countermeasure Strategy and Energy-Efficiency Analysis in Cognitive Radio Networks
|
|
- Bathsheba Powers
- 6 years ago
- Views:
Transcription
1 Journal o Communications Vol., No., January 7 A imary User Emulation Attack Countermeasure Strategy an Energy-Eiciency Analysis in Cognitive Raio Networks unchuan Wang, Xiaorong Xu, Weiwei Wu, an Jianrong Bao College o Telecommunication Engineering, angzhou Dianzi University, angzhou, Zheiang 38, China waynetlg@oxmail.com; xuxr@hu.eu.cn; @63.com; baor@hu.eu.cn Abstract Due to the act that security an energy eiciency are investigate separately in the conventional imary User Emulation Attack (PUEA) countermeasure strategy in Cooperative Spectrum Sensing (CSS) process, the traeo between security an energy eiciency is iscusse in this paper. CSS can improve etection perormance whereas energy consumption will ramatically boost up with the increasing o cooperative users. To tackle this problem, we set CSS energy eiciency in the presence o PUEA as optimal obective, whereas secure etection perormance an secure alse alarm threshol as the constraint conitions. The optimal problem is resolve to achieve a trae-o between energy eiciency an security in the presence o PUEA attack. The optimal usion threshol K an optimal cooperative user numbers can be obtaine in secure CSS with energy eiciency maximization, which guarantees energy eiciency as well as secure CSS etection perormance. The propose PUEA countermeasure strategy etection perormance is presente an compare with traitional Maximum Ratio Combining (MRC) usion rule. Simulation results show that, the propose strategy is immune to PUE intererence power, an it provies high robustness to PUEA attack, which implements the trae-o between security an energy eiciency in Cognitive Raio Network (CRN) eectively. by overlay or unerlay approaches with the premise o not aecting the authorize imary User (PU) normal communications. CR technology has greatly reuce the constraints o spectrum an banwith or the evelopment o wireless technology. It has become one o the potential key technologies in the 5G stanars [], []. CRN is one o the key technologies o 5G [3], owever, CRN is an open network environment, which is particularly vulnerable to malicious user attack. CRN not only aces the conventional wireless network security threats, such as eavesropping attack, tampering ata, etc [4], [5], but also conronts with some new threats such as PUEA [5] an Spectrum Sensing Data Falsiication (SSDF) [6]. The traitional wireless network security problems coul be mainly solve by the encryption o transmitting signals [3], [4], [7]. owever, energy consumption was signiicantly increase in secure transmission ue to the complexity o encryption algorithm an key management mechanism. ence, physical layer (P) security was regare as complement or substitution o conventional encryption techniques, which ha rawn much attention by network security researchers [8]-[]. The basic iea o P security is to make use o the ranom eature o the noisy channel to ensure that malicious users can not obtain transmit message rom the channel. In other wors, P security uses the inherent uncertainty o the noisy channel, in orer to ensure CRN ata security. P security consiere the security rom inormation theory an signal processing perspectives [8], [9]. P security containe two aspects. On the one han, CRN security capacity was theoretically analyze rom the inormation theory perspective. On the other han, secure transmit rates to achieve security capacity was investigate rom signal processing an optimization perspective [9], []. owever, CRN requires more on energy eiciency an system security in the pursuit o high spectrum utilization an high transmission eiciency. Recent research showe that, energy consume in spectrum sensing phase an ata transmission phase were the main energy cost in CRN []. With the increasing o SU ensity an the expansion o network coverage area, CRN energy consumption problem has rawn much attention. Namely, Green Communications has become one o the Inex Terms Cooperative Spectrum Sensing (CSS), imary User Emulation Attack (PUEA), countermeasure strategy, energy eiciency, etection perormance I. INTRODUCTION Cognitive Raio (CR) is a promising technique that enables a smart exploitation o the unuse portions o the license spectrum. In Cognitive Raio Networks (CRN), Seconary User (SU) can aaptively aust the operational parameters (such as the transmit power, carrier requency an moulation metho) via sensing the external wireless environments. SU can access to the authorize spectrum to realize ynamic spectrum sharing Manuscript receive August 3, 6; revise January, 7. This work was supporte in part by the ogram o Zheiang ovincial Natural Science Founation o China (Grant No. L5F8, LZ4F3), National Natural Science Founation o China (Grant No. 6475), the Grauate Scientiic Research Founation o angzhou Dianzi University in 6 (ZX663835) an oung Talent Cultivation oect o Zheiang Association or Science an Technology (Grant No. 6CGC9). Corresponing author xuxr@hu.eu.cn. oi:.7/cm Journal o Communications
2 Journal o Communications Vol., No., January 7 evelopment trens or CRN in the uture. Green CRN is the research hotspot in CR at present. It is also one o the key techniques to realize uture energy eiciency wireless communications [], []. In aition, ue to two ierent network architectures existe in CRN, namely, primary network an cognitive network, ata transmission security issue has become a new research irection in the iel o CRN [7]-[9]. P security is the emphasis in energy-eicient CRN. In [], the authors pointe out that there is an optimal trae-o between energy eiciency an transmission security in CRN. The system aopts ierent P security strategies in accorance with ierent malicious attacks, thus energy consumption varies or ierent security schemes. Thereore, in orer to ensure secure an reliable transmission, it is necessary to iscuss the optimal energy-eicient security strategy or a speciic attack. Re. [8] an Re. [9] investigate the common malicious attacks an the corresponing countermeasure strategies in CRN. In CRN spectrum sensing phase, SUs irstly ientiy legitimate SUs an malicious SUs. The presence o malicious SUs will inluence the accuracy o secure cooperative spectrum sensing [5], [6]. A propose scheme in [6] mainly stuie the trae-o between energy eiciency an security or SSDF attack. The scheme eectively etecte channel availability through reporting message authentication coe (MAC) to the usion center. owever, ash unction was require to generate MAC in this scheme, which inevitably resulte in the increasing o complexity. Furthermore, the propose scheme in t consier the inluence o legitimate SUs reporting error rate as well as reporting istance to CSS energy consumption [6]. In [5], the authors stuie eective CSS in the presence o PUEA. Local sensing inormation rom ierent SU was weighte at the usion center. The weights coul be optimize by maximizing the etection probability uner a constraint o alse alarm probability. Meanwhile, the inluence o channel estimation error on CSS etection perormance was also iscusse. In [3], the authors investigate PUEA attack an its countermeasure strategy in mobility CRN scenario. A hybri strategy base on PUEA countermeasure with CSS etection was propose, which was satisie the requirements o alse alarm probability an the etection perormance in PUEA attack with lower energy consumption. At the same time, the overall perormance o PUEA problem with game theory analysis was presente in the conitions o ierent attack overhea an etection overhea, which coul reuce the total resource consumption an increase CRN throughput [3], [4]. At present, P security in spectrum sensing phase mainly ocuses on the PUEA or SSDF countermeasure strategies [4], [5], [7]-[9], [3], [4]. Aime to the trae-o between security an energy eiciency in CRN, the paper mainly ocuses on energy-eicient PUEA 7 Journal o Communications countermeasure strategy with perormance analysis [3], [6], [], [5]. Speciically, energy eiciency o the propose PUEA countermeasure strategy is erive in etail. Energy eiciency is set as the optimal obective, whereas secure etection probability an secure alse alarm threshol as the constraint conitions. Then, the optimal usion threshol K an optimal SU number N are presente to achieve the maximization o energy eiciency by resolving the optimization problem, which guarantees energy eiciency as well as secure CSS etection perormance. The rest o this paper is organize as ollows, Section II escribes the system moel. Secure CSS uner PUEA is escribe in etail in the Section III. Section IV escribes the propose countermeasure strategy against PUEA an analyzes its energy eiciency perormance. Simulation results are presente an iscusse in Section V. Finally, conclusions are rawn in Section VI. II. SSTEM MODEL In this paper, we consier CSS in a CRN where N SUs trying to access a target spectrum. As shown in Fig., to avoi conlict with the PU, each SU etects the target spectrum within a speciic perio an uges whether the spectrum is occupie by PU or not. Then, SUs report local etection results to the Fusion Center (FC). Finally, the FC makes global etection to ecie whether the spectrum is occupie by PU via speciic usion rule. The PUE attacker mimics the eature o PU an launches the PU signal to eceive SUs, which makes SUs to uge that PU is occupying the authorize spectrum. Thereore, SUs are orce to switch to another spectrum holes. The key issue to een PUEA is that SUs shoul ientiy PU an PUEA, an make right ugment on PU an PUEA signals [5], [3], [4]. In this paper, energy etection is implemente in SU local etection, an har usion with K-out-o-N usion rule is applie at FC. It is assume that the report channels rom SUs to the FC are noisy. imary user PUE attacker Seconary user SU SU SU3 SUN Channel between attacker an seconary user Channel between primary an seconary user an reporting Fusion Center channel Fig.. System moel o cooperative spectrum sensing with PUEA in CRN. III. COOPERATIVE SPECTRUM SENSING IN TE PRESENCE OF PUEA SU local spectrum sensing consists o three common techniques. Namely, energy etection, matche iltering
3 Journal o Communications Vol., No., January 7 etection an cyclo-stationary eature etection [], []. In this paper, we use energy etection to uge the authorize spectrum utilization. Due to the presence o PUEA, or N, the signal receive by the th SU at the ith (i M ) time instant [5] can be written as P h x ( i) w ( i), y () i P h x ( i) P h x ( i) w ( i), m m, m, p p, p, m m, m, We enote that when PUEA is present, the absence an presence o PU can be expresse as two hypotheses respectively, that is, an. Signals transmitte by PU an PUE attacker with power P p an P m are x i an x, () i respectively. PU signal x, () i is p, () m assume to be inepenently an ientically istribute (i.i.) complex Gaussian ranom variable with zero mean an unit variance. Due to the similarity between malicious an primary signal in PUEA, the attacker s signal xm, () i also ollows the complex Gaussian istribution. hp, an hm, enote the instantaneous channel gain rom primary user to the th seconary user an rom PUE attacker to the th seconary user, respectively. In aition, all the channel links are assume as block aing channel, that is, hp, an h m, are constant within one time interval. w () i enotes the aitive white Gaussian noise at the th seconary user with zero mean an variance. The signal-to-noise ratio (SNR) receive at the th SU can be expresse as = h. p, w In this paper, we aopt energy etection metho in which M samples o signal energy are ae uring one etection interval, the power etecte by the th SU can be expresse as m, () w p M y ( i). Due to p, () i () x i an x i ollow the complex Gaussian istribution with zero mean an unit variance, the ecision statistic subect to the central Chi-square ( ) istribution with M egrees o reeom [6] where an respectively M ~ M ( ) y () i () i ~ M ( ) are the variance or an Ph m m, w P h P h p p, m m, w is (3) In spectrum sensing, alse alarm probability an etection probability eine as over one etection interval are (4) where is etection threshol. ence, the alse alarm probability an etection probability at the th SU are expresse as [], [], [7] ( M, ) ( M, ) Each SU issues a local binary ecision, the spectrum status. I (5) about, then, which enotes that the spectrum is occupie by PU. Otherwise, the spectrum is ientiie as unuse by PU [], [], [7]. All local ecisions are reporte to the FC via reporting channels. At the FC, a speciic usion rule (FR) is employe to process these ecisions in orer to make the inal global ecision. In this paper, we use K-out-o-N rule, where K is a preeine threshol on the number o SUs who etect PU on the spectrum (K N ). The iea behin this rule is to compare the number o SUs that report with K. I it is less than K, then the spectrum is unuse by PU. Otherwise, the spectrum is use by PU. In this paper, the reporting channel between SU an FC is assume to be noisy, which can be moelle as binary symmetric channel with error probability e, hence, we can moiy the expression o an as below [8]. ( ) ( P x e ( ) ( P y e The overall etection probability ( alse-alarm probability ( respectively as ollows N ( ) N ( ) N N x x K N N y y K (6) (7) ) an overall ) can be expresse IV. ENERG EFFICIENC ANALSIS OF PUEA COUNTERMEASURE STRATEG (8) Energy eiciency ( ) can be eine as the ratio o average throughput in bits to average energy consumption in Joule. The average throughput is eine as average number o successully transmitte bits, an the average consume energy is the energy consume uring CSS an reporting results transmission in the reporting phase. The average throughput can be expresse as ollows Th ( ) R (9) 7 Journal o Communications 3
4 Journal o Communications Vol., No., January 7 where is the probability that the spectrum is not occupie by PU. R enotes the ata rate, an T is the ata transmission time interval. The actor ( ) in (9) represents the probability o successul elivering the transmit ata. The average energy consumption by all SUs is given as ollows where es E Ne e () s unuse t is the energy consume uring CSS by one SU, an et is the energy consume uring reporting phase. Note that transmission occurs only i the spectrum is ientiie as unuse. Thus, unuse can be given as ollows ( ) ( ) unuse () where. Thereore, energy eiciency o eense strategy against PUEA can be expresse as ollows ( ) RT Ne e ( ) s t () The optimization o K or energy eiciency in the propose PUEA countermeasure strategy with constraint conitions on the an, which can be state as below ( ) RT max max K K Ne e ( ) s.t. an s t (3) The K value that satisies (3) without the constraint can be obtaine by the erivative o obective into zero, namely RT K Ne e ( ) s t ( ) RTet K K Nes et ( ) The erivatives o approximately as ollows an (4) can be written N ( K ) ( K) y ( y ) K K N ( K ) ( K) x ( x ) K K K N K K N K (5) Substitute (5) into (4) with some mathematical calculations, the optimal K that maximizes the energy eiciency can be presente in a close orm shown as below Ne s et ( ) y ln N ln et ( ) x K (6) x( y) ln y ( x ) ence, or a given N an a given alse alarm probability, the etection probability ecrease as K increases, the optimal K that maximizes energy eiciency while ulilling the etection probability requirements can be written as below. Kopt min K, K (7) where the value o the K that satisies the constraint conition in CSS etection. From [7], we can get the approximate expression o K shown as below. K N N (8) ( ) x( x) x.5 V. SIMULATION RESULTS AND ANALSIS In this section, we analyze the simulation perormance o the propose PUEA countermeasure strategy with energy eiciency optimization. We assume that there is one PUE attacker in the propose scheme. Sensing channels an reporting channels are i.i.. The number o samples within a etection interval is M 3 [5]. All simulation parameters are summarize in Table I. These parameters are assume to be ientical among all SUs. TABLE I: SIMULATION PARAMETERS Parameters Values Parameters Values N.6..5 e s Joule e t Joule T.3 sec R Kbps Fig. shows the receiver operation characteristics (ROC) perormance when the FC uses har FR or CSS in the presence o PUEA. In this igure, the average SNR is set to be B an the transmitting power o primary user an PUE attacker are ientical P P. From Fig., we in that the etection probability o non-cooperation scheme is severely reuce by PUEA attack. When we use K-out-o-N FR in FC, a signiicant etection perormance improvement is achieve, even better than the non-cooperation scheme when the PUE attacker is absent. From Fig., we can in that when we use K-out-o-N rule, or a given N, the threshol K also have great impact on the etection perormance. When the alse alarm probability is ixe, the overall etection perormance shows better with the ecreasing o threshol K. The reason is that the FR approaches to OR rule with the ecreasing o K, so that the overall etection perormance is enhance. p m 7 Journal o Communications 4
5 Journal o Communications Vol., No., January 7 Fig. 3 shows energy eiciency o the propose PUEA countermeasure strategy with a set o ierent threshol K an SU noes N. In this igure, the average SNR is set to be B, the constraint conitions are.6 an.. It is shown that, the maximum energy eiciency o the propose PUEA countermeasure 4 strategy achieves to 7.8 bit/ Joule with N 5 an K. As shown in Fig. 3, we can also in that the threshol K that achieves to the maximum energy eiciency increases with the increasing o SU noes in CSS. In aition, with the increasing o SU noes, the achievable maximum energy eiciency is lower. The reason is that, more SU noes will increase the energy consumption in the process o CSS an reporting phase, which will ecrease energy eiciency. Detection probability, No cooperation,attack No cooperation,no attack an rule or rule K=,N=6 K=4,N= False alarm probability, Fig.. ROC o CSS with har usion rule in the presence o PUEA. Energy Eiciency [bit/joule] x 4 N=4 N=5 N=6 N=7 N=8 N= K Fig. 3. Energy eiciency o the propose strategy with ierent K an N. From perormance analysis in Fig. 3, we oun that the propose PUEA countermeasure strategy can achieve the maximum energy eiciency with SU number N 5 an the optimal threshol K. Fig. 4 shows the ROC perormance o non-cooperation, K-out-o-N rule an MRC with/without PUEA attack. For the same FR, ROC perormance without PUEA is better than that with PUEA. When the PUE is present, or the same alse alarm probability, the etection probability o the propose PUEA countermeasure strategy with K-out-o-N FR outperorms the MRC scheme. When., the etection perormance o the propose strategy shows even better than the non-cooperation scheme without PUEA. owever, alse alarm probability increases with the increasing o etection probability. ence, it s necessary to make a trae-o between alse alarm probability an etection probability to ensure the ROC perormance o secure CSS. Fig. 5 shows secure CSS etection perormance o the propose PUEA countermeasure strategy in the presence o PUEA with ierent power ratio between PUE an PU. We eine the transmit power ratio between PUE an PU as P p (9) P Eq. (9) normalizes PUE attacker s power in terms o PU s power. A larger value o p inicates PUE attacker has more transmit power. In this igure, or a given alse alarm probability threshol., the SNR threshols or each SU are ientical. Secure CSS etection perormance o the propose scheme is compare with MRC scheme whereas p is set to be.// respectively. As p increases rom. to, etection perormance o both schemes are ecrease. p inicates PUE power is ominant over the noise power. ence, the etection perormance is eteriorate even when the average SNR is very high. We also in that the etection perormance o the propose secure CSS scheme base on K-out-o-N FR outperorms MRC FR signiicantly. What s more, the etection perormance o propose scheme is almost inepenent o the value p. That is, PUE power has harly aecte the propose PUEA countermeasure strategy, which inicates the propose scheme ensures the security o CSS eectively, an the propose scheme has robustness to een PUEA attack. m p VI. CONCLUSIONS This paper investigates secure CSS strategy that ensures energy eiciency an P layer security in CSS spectrum sensing uner the presence o PUEA in the CRN. We obtain the optimal threshol K an optimal SU numbers N o secure CSS base on K-out-o-N FR via the solution o energy eiciency optimization problem, in orer to ensure the CSS etection perormance simultaneously. In aition, we analyze the ROC perormance with the consieration o optimal energy eiciency. With the comparison o MRC FR, it is apparent that secure etection perormance o the propose scheme with K-out-o-N FR outperorms MRC FR scheme in terms o the same alse alarm probability scenario. Detection perormance o the propose PUEA countermeasure strategy can be signiicantly enhance in 7 Journal o Communications 5
6 Journal o Communications Vol., No., January 7 high SNR region. The propose scheme is almost immune to PUE intererence power, which ensures CSS security. Thereore, the propose strategy has higher robustness to PUEA attack, an it makes a trae-o between energy eiciency an etection perormance eectively. Detection probability, No cooperation,attack No cooperation,no attack. K=,N=5,attack K=,N=5,no attack. MRC,no attack MRC,attack False alarm probability, Fig. 4. ROC perormance o non-cooperation K-out-o-N rule an MRC with/without PUEA attack. Detection probability, MRC,p= MRC,p=. MRC,p= K=,N=5,p=. K=,N=5,p= K=,N=5,p= SNR(B) Fig. 5. Detection perormance o the propose PUEA countermeasure strategy with ierent power ratios. ACKNOWLEDGMENT The authors woul like to greatly appreciate anonymous reviewers or their valuable comments an constructive suggestions in helping to improve the quality o this paper. REFERENCES [] I. F. Akyiliz, W.. Lee, M. C. Vuran, an S. Mohanty, Next generation/ynamic spectrum access/cognitive raio wireless networks: A survey, Computer Networks, vol. 5, no. 3, pp. 7-59, September 6. [] I. F. Akyiliz, B. F. Lo, an R. Balakrishnan. Cooperative spectrum sensing in cognitive raio networks: A survey, Physical Communications, vol. 4, no., pp. 4-6, March. [3] X. ong, J. Wang, an C. X. Wang. Cognitive Raio in 5G: A perspective on energy-spectral eiciency traeo, IEEE Communication Magazine, vol. 5, no. 7, pp , 4. [4] T. Chen an G. Wei. Stuy on physical layer security o wireless networks, Doctoral Dissertation o South China University o Technology, 3. [5] C. Chen,. Cheng, an. D. ao. Cooperative spectrum sensing in cognitive raio networks in the presence o the primary user emulation attack, IEEE Transactions on Wireless Communications, vol., no. 7, pp. 35-4,. [6] S. Althunibat, V. Sucasas,. Marques, J. Roriguez, R. Taazolli, an F. Granelli, On the traeo between security an energy eiciency in cooperative spectrum sensing or cognitive raio, IEEE Communications Letters, vol. 7, no. 8, pp , 3. [7]. N. Li. Research on security an privacy in cognitive raio networks, Doctoral Dissertation o Xiian University, 3. [8] Z. Shu,. ian, an S. Ci. On physical layer security or cognitive raio networks, IEEE Network, vol. 7, no. 3, pp. 8-33, 3. [9] J. Li, Z. Feng, Z. Feng, an P. Zhang, A survey o security issues in cognitive raio networks, China Communications, vol., no. 3, pp. 3-5, 5. []. Zou, X. Wang, an W. Shen, Physical-layer security with multi-user scheuling in cognitive raio networks, IEEE Transactions on Communications, vol. 6, no., pp , 3. [] J. Wang, J.. Zhao, an J. J. Du, Survey on cognitive raio green networks with cross-layer technology, Telecommunication Science, vol. 3, no. 3, pp. 4-9, 4. [] S. Eryigit, G. Gur, S. Bayhan. Energy eiciency is a subtle concept: Funamental traeos or cognitive raio networks, IEEE Communication Magazine, vol. 5, no. 7, pp.3-36, 4. [3] F. J. Bao. Research on primary user emulation attack an countermeasures with mobile seconary users in cognitive raio networks, Master Dissertation o Zheiang University, 3. [4] F. Bao, L. Xie, an. Chen, Analysis o primary user emulation attack with motional seconary users in cognitive raio networks, in oc. IEEE 3r International Symposium on Personal Inoor an Mobile Raio Communications, September, pp [5] C. Comaniciu an. V. Poor, On energy-secrecy traeos or Gaussian wiretap channels, IEEE Transactions on Inormation Forensics an Security, vol. 8, no., pp , 3. [6] J. ang,, Chen, W. Shi, X. Dong, an T. Peng. Cooperative spectrum sensing against attacks in cognitive raio networks, in oc. IEEE International Conerence on Inormation an Automation, 4, pp [7] S. Althunibat, M. Di Renzo, an F. Granelli, Optimizing the K-out-o-N rule or cooperative spectrum sensing in cognitive raio networks, in oc. IEEE Global Communications Conerence (IEEE Globecom 3) Communications os, Reliability an Moeling Symposium, 3, pp [8] X. Xu, J. Bao,. Luo, an. Wang, Cooperative wieban spectrum etection base on maximum 7 Journal o Communications 6
7 Journal o Communications Vol., No., January 7 likelihoo ratio or CR enhance VANET, Journal o Communications, vol. 8, no., pp. 84-8, 3. unchuan Wang is with the College o Telecommunication Engineering, angzhou Dianzi University (DU), angzhou, China, as master. e receive the B. Eng. egree in Communication Engineering rom Tianin University o Technology, Tianin, China, in 5. e is currently working towar his Master egree in the College o Telecommunication Engineering, DU. is research interests emphasize on energy eiciency an P security in Cognitive Raios (CR). Xiaorong Xu is with the College o Telecommunication Engineering, angzhou Dianzi University (DU), angzhou, China, as associate proessor an master supervisor. e receive the B. Eng. egree in Communication Engineering an M. Eng. egree in Communication an Inormation System rom DU, angzhou, China, in 4 an 7, respectively. e receive Ph.D. egree maor in Signal an Inormation ocessing rom Naning University o Posts an Telecommunications (NJUPT), Naning, China, in. eviously, rom to 3, he was working as a postoctoral researcher in the Institute o Inormation an Communication Engineering, Zheiang University (ZJU), angzhou, China. During 3-4, he serve as a research scholar with the Electrical an Computer Engineering Department, Stevens Institute o Technology (SIT), oboken, NJ, USA. Currently, he is working as an associate proessor an master supervisor in DU. Dr. Xu s research interests emphasize on energy eiciency an P security in Cognitive Raios (CR) an energy eiciency in cooperative communications, etc. Weiwei Wu is with the College o Telecommunication Engineering, angzhou Dianzi University (DU), angzhou, China, as master. e receive the B. Eng. egree in Communication Engineering rom Anhui University o Technology, Anhui, China, in 5. e is currently working towar his Master egree in the College o Telecommunication Engineering, DU. is research interests emphasize on energy eiciency an optimal resource allocation in Cognitive Raios (CR). Jianrong Bao is with the College o Inormation Engineering, angzhou Dianzi University (DU), angzhou, China, as associate proessor, e receive the B. Eng. egree in Polymer Material Engineering an M. Eng. egree in Communication an Inormation System rom Zheiang University o Technology, angzhou, China, in an 3, respectively. e receive Ph.D. egree maor in Communication an Inormation System rom Tsinghua University, Beiing, China, in 9. eviously, rom to 3, he was working as a postoctoral researcher in the Institute o Inormation an Communication Engineering, Zheiang University (ZJU), angzhou, China. Currently, he is working as associate proessor in DU. Dr. Bao s research interests emphasize on energy eiciency in Cognitive Raios (CR) an cooperative communications, etc. 7 Journal o Communications 7
Joint Cooperative Relaying and Jamming for Maximum Secrecy Capacity in Wireless Networks
Joint Cooperative Relaying an Jamming for Maximum Secrecy Capacity in Wireless Networks Li Wang, Chunyan Cao, Mei Song an Yu Cheng Beijing Key Laboratory of Work Safety Intelligent Monitoring School of
More informationSECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS
SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS Xiaohua Li 1 1 Department of ECE State University of New York at Binghamton Binghamton, NY 139, USA {xli,jhwu1}@binghamton.eu
More informationEnergy-Efficient Infrastructure Sensor Network for Ad Hoc Cognitive Radio Network
1 Energy-Eicient Inrastructure ensor Network or A Hoc Cognitive Raio Network Muhamma Usman, Dongsoo Har, enior Member, IEEE, an Insoo Koo, Member, IEEE Abstract We propose an energy-eicient network architecture
More informationResource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users
Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users D. Richar Brown III Electrical an Computer Engineering Department Worcester Polytechnic Institute Worcester,
More informationEffects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks
Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks Efe F. Orumwense 1, Thomas J. Afullo 2, Viranjay M. Srivastava 3 School of Electrical, Electronic and Computer Engineering,
More informationThe Analysis and Complementarity of Abbe Principle Application Limited in Coordinate Measurement
Proceeings of the Worl Congress on Engineering 00 Vol III The Analysis an Complementarity of Abbe Principle Application Limite in Coorinate Measurement Fei Yetai, Shang Ping, Chen Xiaohuai, Huang Qiangxian
More informationEffect of Carrier Frequency Offset on the BER Performance of Variable Spreading Factor OFCDM Systems
This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the ICC 008 proceeings. Effect of Carrier Frequency Offset on the erformance
More informationMULTI-STAGES CO-OPERATIVE/NON- COOPERATIVE SCHEMES OF SPECTRUM SENSING FOR COGNITIVE RADIO SYSTEMS
MULTI-STAGES CO-OERATIVE/NON- COOERATIVE SCHEMES OF SECTRUM SENSING FOR COGNITIVE RADIO SYSTEMS Anwar Mousa 1 an Tara Javii 2 University o Caliornia, San Diego (UCSD)- Jacobs School o Engineering 9500
More informationResearch Article A Novel Approach to Wideband Spectrum Compressive Sensing Based on DST for Frequency Availability in LEO Mobile Satellite Systems
Hinawi Publishing Corporation Mathematical Problems in Engineering Volume 26, Article ID 83972, 3 pages http://x.oi.org/.55/26/83972 Research Article A Novel Approach to Wieban Spectrum Compressive Sensing
More informationCooperative Spectrum Sensing in Cognitive Radio
Cooperative Spectrum Sensing in Cognitive Radio Project of the Course : Software Defined Radio Isfahan University of Technology Spring 2010 Paria Rezaeinia Zahra Ashouri 1/54 OUTLINE Introduction Cognitive
More informationA New GNSS Acquisition Method with Signal Down Sampling in Frequency Domain
A ew SS Acquisition Metho with Signal Down Sampling in Frequency Domain Feng Xu an Yang ao, eomatics Engineering, University o Calgary, 5 University Drive,.W., Calgary, AB, Canaa School o eoesy an eomatics,
More informationCapacity Gain from Transmitter and Receiver Cooperation
Capacity Gain from Transmitter an Receiver Cooperation Chris T. K. Ng an Anrea J. Golsmith Dept. of Electrical Engineering Stanfor University, Stanfor, CA 90 Email: ngctk, anrea}@wsl.stanfor.eu arxiv:cs/00800v1
More informationDynamic Hybrid Duplex for Rate Maximization in OFDMA. Sangmin Oh and Chae Y. Lee
Dynamic Hybri Duplex for Rate Maximization in OFDMA Sangmin Oh an Chae Y. Lee Dept. of Inustrial Engineering, KAIST, 373-1 Kusung Dong, Taeon, Korea Tel: +82-42-350-5916, FAX: +82-42-350-3110 Email: {sangmin.oh,
More informationFor Review Only. WITH the proliferation of cloud computing, data center
Page o Journal o Lightwave Technology 0 0 0 0 Lightpath Management in SDN-Base Elastic Optical Networks with Power Consumption Consierations Yu Xiong,, Jin Shi, Yaya Yang, Yi Lv, George N. Rouskas, Key
More informationSUBSET: A Joint Design of Channel Selection and Channel Hopping for Fast Blind Rendezvous in Cognitive Radio Ad Hoc Networks
SUBSET: A Joint esign of Channel Selection an Channel Hopping for Fast Blin enezvous in Cognitive aio A Hoc Networks Xingya Liu an Jiang Xie epartment of Electrical an Computer Engineering The University
More informationJoint Partial Relay Selection, Power Allocation and Cooperative Maximum Likelihood Detection for MIMO Relay Systems with Limited Feedback
Joint Partial Relay Selection, Power Allocation an Cooperative Maximum Likelihoo Detection for MIMO Relay Systems with Limite Feeback Thomas Hesketh, Rorigo C. e Lamare, Stephen Wales Department of Electronics,
More informationIN GENERAL, an optical network can consist of a
1 Geometric Capacity Provisioning for Wavelength-Switche WDM Networks Li-Wei Chen, Eytan Moiano Abstract In this paper, we use an asymptotic analysis similar to the sphere-packing argument in the proof
More informationEnergy Efficient Relay Selection for Cooperative Relaying in Wireless Multimedia Networks
Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimeia Networks Zhengguo Sheng, Jun Fan, Chi Harol Liu, Victor C. M. Leung, Xue Liu*, an Kin K. Leung Orange Labs, France Telecom,
More informationPower-Aware Lightpath Management for SDN-Based Elastic Optical Networks
1 Power-Aware Lightpath Management or SDN-Base Elastic Optical Networks Yu Xiong, Jin Shi, Yi Lv, George N. Rouskas Key Laboratory o Optical Communication an Networks, Chongqing University o Posts an Telecommunications,
More informationCache-Aided Content Delivery in Fog-RAN Systems with Topological Information and no CSI
Cache-Aie Content Delivery in Fog-RAN Systems with Topological Information an no CSI Wei-Ting Chang, Ravi Tanon, Osvalo Simeone Abstract In this work, we consier a Fog Raio Access Network (F-RAN) system
More informationUsing Chaos to Detect IIR and FIR Filters
PIERS ONLINE, VOL. 6, NO., 00 90 Using Chaos to Detect IIR an FIR Filters T. L. Carroll US Naval Research Lab, Coe 66, Washington, DC 07, USA Abstract In many signal processing applications, IIR an FIR
More informationROC Analysis of BLM Detector in AF Relays Based Cooperative Wireless Networks Omar GATERA 1, Ahmet Hamdi KAYRAN 1 and Haci ILHAN 2
6 International Conference on Sustainable Energy, Environment an Information Engineering (SEEIE 6) ISBN: 978--6595-337-3 ROC Analys of BLM Detector in AF Relays Base Cooperative Wireless Networks Omar
More informationCross-layer Routing Optimization for Wireless Networks with Cooperative Diversity
Cross-layer Routing Optimiation for Wireless Networs with Cooperative Diversity Zhiguo Ding an Kin K. Leung Department of Electrical an Electronic Engineering Imperial College Lonon, UK. Email: {higuo.ing,
More informationPerformance Analysis and Comparison of ZF and MRT Based Downlink Massive MIMO Systems
Performance Analysis an Comparison of ZF an MRT Base Downlink Massive MIMO Systems Tebe Parfait, Yujun uang, 1,2 ponyo Jerry 1 Mobilelink Lab Univ of Electronic Sci an Tech of China, UESTC Chengu, China
More informationWireless Event-driven Networked Predictive Control Over Internet
UKACC International Conference on Control 22 Cariff, UK, 3-5 September 22 Wireless Event-riven Networke Preictive Control Over Internet Wenshan Hu, Hong Zhou, an Qijun Deng Abstract In networke control
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 1
IEEE JORNAL ON SELECTED AREAS IN COMMNICATIONS 1 Full-Duplex Spectrum-Sensing an MAC-Protocol for Multichannel Nontime-Slotte Cognitive Raio Networks Wenchi Cheng, Xi Zhang, Senior Member, IEEE, an Hailin
More informationEnergy Efficient Virtual MIMO-based Cooperative Communications for Wireless Sensor Networks
Energy Efficient Virtual MIMO-base Cooperative Communications for Wireless Sensor Networks Suharman K. Jayaweera Department of Electrical an Computer Engineering Wichita State University, Wichita, KS,
More informationPerformance of Amplify-and-Forward Relaying with Wireless Power Transfer over Dissimilar Channels
http://x.oi.org/.5755/ j.eee..5.333 ELEKTRONIKA IR ELEKTROTECHNIKA ISSN 39-5 VOL. NO. 5 5 Performance of Amplify-an-Forwar Relaying with Wireless Power Transfer over Dissimilar Channels Dac-Binh Ha Duc-Dung
More informationErlang Capacity of Multi-class TDMA Systems with Adaptive Modulation and Coding
Downloae from orbittuk on: Oct 2, 218 Erlang Capacity of Multi-class TDMA Systems with Aaptive Moulation an Coing Wang, Hua; Iversen, Villy Bæk Publishe in: Proceeings of IEEE ICC 28 Link to article, DOI:
More informationQoS Topology Control in Ad Hoc Wireless Networks
QoS Topology Control in A Hoc Wireless Networks Xiaohua Jia, Deying Li Dept of Computer Science City University of Hong Kong Hong Kong, China Dingzhu Du Dept of Computer Science an Engineering University
More informationMODELLING OF GPS SIGNAL LARGE SCALE PROPAGATION CHARACTERISTICS IN URBAN AREAS FOR PRECISE NAVIGATION
Int. J. Elec&Electr.Eng&Telcomm. 2012 G Sateesh Kumar et al., 2012 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 1, No. 1, October 2012 2012 IJEETC. All Rights Reserve MODELLING OF GPS SIGNAL LARGE
More informationImplementation of Beam Formation for WMNs
Implementation of Beam Formation for WMNs M. UTHANSAKUL, S. PRADITTARA AND P. UTHANSAKUL School of Telecommunication Engineering Suranaree University of Technology 111 University Avenue, Muang, Nakhonratchasima
More informationCooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationRECENTLY, the 2G standard GSM was enhanced by
274 IEEE TRANSACTIONS ON WIREESS COMMUNICATIONS, VO. 5, NO. 2, FEBRUARY 2006 The Training Sequence Coe Depenence of EDGE Receivers using Zero IF Sampling Martin Krueger, Member, IEEE, Robert Denk, an Bin
More informationAN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS
AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS Davi B. Smith (1) (1) Faculty of Engineering (Telecommunications), University of Technology Syney PO Box 13 Broaway NS 007 Australia E-mail:
More informationVoltage/Power Steady State Stability Enhancement of AC-DC for both SIF and MIF System Configurations by Shunt SVC
International Journal o Applie Engineering Research ISSN 97-56 Volume, Number 8 (6) pp 97-9 Research Inia Publications. http://www.ripublication.com Voltage/Power Steay State Stability Enhancement o AC-DC
More informationRelay Deployment and Power Control for Lifetime Elongation in Sensor Networks
Relay Deployment an Power Control for Lifetime Elongation in Sensor Networks Yufeng Xin, Tuna Güven, Mark Shayman Institute of Avance Computer Stuies University of Marylan, College Park, MD 074 e-mail:
More informationSecure Communication with a Wireless-Powered Friendly Jammer
Secure Communication with a Wireless-Powere Frienly Jammer Wanchun Liu, Xiangyun Zhou, Salman Durrani, an Petar Popovski arxiv:42.0349v2 [cs.it] 26 Aug 205 Abstract In this paper, we propose to use a wireless-powere
More informationTHe notion of the disease [1] has been extended from
IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 Effective Network Quarantine with Minimal Restrictions on Communication Activities uanyang Zheng an Jie Wu, Fellow, IEEE Abstract
More informationJoint Optimized Energy and Minimum Sensor Deployment Density for Cooperative Spectrum Sensing under Rayleigh Fading Channel
Joint Optimize Energy an Minimum Sensor Deployment Density for Cooperative Spectrum Sensing uner Rayleigh Faing Channel Hai Ngoc Pham, Yan Zhang, Tor Skeie, Paal E. Engelsta, Frank Eliassen Department
More informationAadptive Subcarrier Allocation for Multiple Cognitive Users over Fading Channels
Proceedings of the nd International Conference On Systems Engineering and Modeling (ICSEM-3) Aadptive Subcarrier Allocation for Multiple Cognitive Users over Fading Channels XU Xiaorong a HUAG Aiping b
More informationBalanced-energy Sleep Scheduling Scheme for High Density Cluster-based Sensor Networks
Balance-energy Sleep Scheuling Scheme for High Density Cluster-base Sensor Networks Jing Deng, unghsiang S. Han, Weni B. Heinzelman, an Pramo K. Varshney Abstract In orer to conserve battery power in very
More informationInverse sparse grid flood non-uniformity correction
Copyright 2005 Society o Photo-Optical Instrumentation Engineers. This paper was publishe in Technologies or Synthetic Environments: Harware-in-the-Loop Testing X an is mae available as an reprint with
More informationJournal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE
Journal of Asian Scientific Research ISSN(e): 2223-1331/ISSN(p): 2226-5724 URL: www.aessweb.com DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE
More informationRadio Range Adjustment for Energy Efficient Wireless Sensor Networks. Electronic Engineering, Aston University, Birmingham B4 7ET,United Kingdom b
Raio Range Ajustment for Energy Efficient Wireless Sensor Networks Q. Gao a,, K. J. Blow a 1, D. J. Holing a, I. W. Marshall b, X. H. Peng a a Electronic Engineering, Aston University, Birmingham B4 7ET,Unite
More informationDEFENCE AGAINST INTRUDER IN COGNITIVE RADIO NETWORK OMNET BASED APPROACH. J. Avila, V.Padmapriya, Thenmozhi.K
Volume 119 No. 16 2018, 513-519 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ DEFENCE AGAINST INTRUDER IN COGNITIVE RADIO NETWORK OMNET BASED APPROACH J.
More informationProbabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA
Probabilistic Hanshake in All-to-all Broacast Coe Slotte ALOHA Mikhail Ivanov, Petar Popovski, Frerik Brännström, Alexanre Graell i Amat, an Čeomir Stefanović Department of Signals an Systems, Chalmers
More informationIndoor Wireless Planning using Smart Antennas
Inoor Wireless Planning using Smart Antennas Ali Abbasi an Maji Ghaeri Department of Computer Science, University of Calgary Emails: {abbasi, mghaeri}@ucalgary.ca Abstract This paper consiers the problem
More informationWireless Powered Dual-Hop Multiple Antenna Relay Transmission in the Presence of Interference
EEE CC 05 - Wireless Communications Symposium Wireless Powere Dual-Hop Multiple Antenna Relay Transmission in the Presence of nterference Guangxu Zhu, Caijun Zhong, Himal A. Suraweera, George K. Karagianniis,
More informationPERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR
Int. Rev. Appl. Sci. Eng. 8 (2017) 1, 9 16 DOI: 10.1556/1848.2017.8.1.3 PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR M. AL-RAWI University of Ibb,
More informationShadowing Correlation Model for Indoor Multi-hop Radio Link in Office Environment
JAVA, International Journal of Electrical Electronics Engineering Volume 4, Number, April 26 Shaowing Moel for Inoor Multi-hop Raio Link in Office Environment Mohamma Fahli Inustrial Engineering Department
More informationSub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks
Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks Ahmed Alahmadi, Tianlong Song, Tongtong Li Department of Electrical & Computer Engineering Michigan State University,
More informationIntroduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003
Introuction to Wireless ommunication Systems EE 476/EE 5/S 53 Winter 3 Review for Exam # April 5, 3 Exam Details Must follow seating chart - Poste 3 minutes before exam. heating will be treate very seriously.
More informationDESIGN AND IMPLEMENTATION OF FULL BRIDGE MODULAR DC-DC CONVERTER FOR SOLAR CONVERSION SYSTEMS
VOL. 13, NO. 4, FEBRUARY 18 ISSN 1819-668 ARPN Journal o Engineering an Applie Sciences 6-18 Asian Research Publishing Network (ARPN). All rights reserve. DESIGN AND IMPLEMENTATION OF FULL BRIDGE MODULAR
More informationPower Efficient Pilot Symbol Power Allocation under Time-variant Channels
Power Efficient Pilot Symbol Power Allocation uner Time-variant Channels Michal Šimko, Paulo S. R. Diniz,QiWang an Markus Rupp Institute of Telecommunications, Vienna University of Technology, Vienna,
More informationIndoor Positioning Using Ultrasound and Radio Combination
Inoor Positioning Using Ultrasoun an Raio Combination Gintautas Salcius, Evalas Povilaitis, Algimantas Tacilauskas Centre of Real Time Computer Systems, Kaunas University of Technology Stuentu St. 50,
More informationEnergy Efficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control
11 I Colloquium on Humanities, Science an ngineering Research (CHUSR 11), Dec 5-6 11, Penang nergy fficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control Z.W. Siew, A. Kiring,
More informationRCGA based PID controller with feedforward control for a heat exchanger system
Journal of the Korean Society of Marine Engineering, Vol. 1, No. pp. 11~17, 17 ISSN 223-7925 (Print) J. Korean Soc. of Marine Engineering (JKOSME) ISSN 223-8352 (Online) https://oi.org/.5916/jkosme.17.1..11
More informationOn the performance of truncated type III hybrid ARQ scheme with code combining
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2003; 3:641 658 (DOI: 10.1002/wcm.147) On the performance of truncate type III hybri ARQ scheme with coe combining Qingchun Chen*,y
More informationTopology-assisted techniques to relay selection for homogeneously distributed wireless sensor networks
This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceeings. Topology-assiste techniques to relay selection
More informationConstruction of Power Efficient Routing Tree for Ad Hoc Wireless Networks using Directional Antenna
Construction of Power Efficient Routing Tree for A Hoc Wireless Networks using Directional Antenna Qing Dai an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,
More informationCooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review
International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review
More informationMultiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios
Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios Khalid Hossain, Ayman Assra, and Benoît Champagne, Senior Member, IEEE Department o Electrical and Computer Engineering,
More informationResearch on the Selection Strategy for Optimal Anchor Nodes Based on Ant Colony Optimization
Sensors & Transucers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Research on the Selection Strategy for Optimal Anchor Noes Base on Ant Colony Optimization Baoxin ZHAO, Bi ZENG Guangong
More informationMinimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues
Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan
More informationDETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING
DETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING Zelko Popovic Distribution engineer Rae Koncara 57, 24300 Backa Topola, Yugoslavia Phone: +38 24 74 220 Fax: +38 24 74 898
More informationThe use of Facts devices in disturbed Power Systems-Modeling, Interface, and Case Study
nternational Journal of Computer an Electrical Engineering, ol., No., April 009 793-898 The use of Facts evices in isturbe Power Systems-Moeling, nterface, an Case Stuy Salim. Haa, A. Haouche, an H. ouyea
More informationASYMMETRIC MODULATION FOR COGNITIVE RADIO AND INTELLIGENT ENVIRONMENTS
ASYMMTRIC MODULATION FOR COGNITIV RADIO AND INTLLIGNT NVIRONMNTS ric. Kreb (SAIC, Chantilly, VA, USA; ekreb@ieee.org); Robert H. Morelos-Zaragoza (San Jose State University, San Jose, CA, USA, r.morelos-zaragoza@ieee.org)
More informationWe are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors
We are IntechOpen, the worl s leaing publisher of Open Access books Built by scientists, for scientists 3,500 108,000 1.7 M Open access books available International authors an eitors Downloas Our authors
More information/13/$ IEEE
A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract
More informationNew M-ary QAM Transmission Payload System
r AIAA ICSSC-005 New M-ary QAM Transmission Payloa System Masayoshi TANAKA * Nihon University, College of Inustrial Technology, --, Izumicho, Narashino, 75-8575, Japan This paper presents a new M-ary moulation
More informationDeterminants of the Bourdon effect
Perception & Psychophysics 1980,28 (1), 39-44 Determinants of the Bouron effect G. 1. N. ROZVANY an R. H. DAY Monash University, Clayton, Victoria 3168, Australia The Bouron illusion is the apparent inwar
More informationDouble Closed-loop Control System Design of PMSM Based on DSP MoupengTao1, a,songjianguo2, b, SongQiang3, c
4th International Conference on Mechatronics, Materials, Chemistry an Computer Engineering (ICMMCCE 2015) Double Close-loop Control System Design of PMSM Base on DSP MoupengTao1, a,songjianguo2, b, SongQiang3,
More informationPage 1. Overview : Wireless Networks Lecture 7: Cellular Networks. The advent of cellular networks. The cellular network design.
Overview 18-759: Wireless Networks Lecture 7: Cellular Networks Dina Papagiannaki & Peter Steenkiste Departments of Computer Science an Electrical an Computer Engineering Spring Semester 2009 http://www.cs.cmu.eu/~prs/wireless09/
More informationA new quasi-2d analytical threshold-voltage model for partially-depleted. short-channel SOI MOSFET
A new qua-d analtical threshol-voltage moel or partiall-eplete short-channel SO MOSFET KWO-MNG HANG, HAN-PANG WANG Department o Electronics Engineering, National hiao-tung Univert, Hnchu, Taiwan 3, R.
More informationLousy Processing Increases Energy Efficiency in Massive MIMO Systems
1 Lousy Processing Increases Energy Eiciency in Massive MIMO Systems Sara Gunnarsson, Micaela Bortas, Yanxiang Huang, Cheng-Ming Chen, Liesbet Van der Perre and Ove Edors Department o EIT, Lund University,
More informationEnergy Detection Spectrum Sensing Technique in Cognitive Radio over Fading Channels Models
Energy Detection Spectrum Sensing Technique in Cognitive Radio over Fading Channels Models Kandunuri Kalyani, MTech G. Narayanamma Institute of Technology and Science, Hyderabad Y. Rakesh Kumar, Asst.
More informationUneven Clustering Routing Algorithm Based on Optimal Clustering for Wireless Sensor Networks
Journal of Communications Vol. 11, No., February 016 Uneven Clustering Routing Algorithm Base on Optimal Clustering for Wireless Sensor Networks Jianpo Li an Junyuan Huo School of Information Engineering,
More informationECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation
ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall 2007 Mohamed Essam Khedr Channel Estimation Matlab Assignment # Thursday 4 October 2007 Develop an OFDM system with the
More informationImplementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization
www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.11, September-2013, Pages:1085-1091 Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization D.TARJAN
More informationA New Speech Enhancement Technique to Reduce Residual Noise Using Perceptual Constrained Spectral Weighted Factors
IOSR Journal of Electronics an Communication Engineering (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735. Volume 6, Issue 3 (May. - Jun. 013), PP 8-33 A New Speech Enhancement Technique to Reuce Resiual Noise
More informationAbstract Harvesting energy from ambient environment is a new promising solution to free electronic devices from electric
Wireless Communication System with RF-base Energy Harvesting: From Information Theory to Green System Tao Li, Pingyi Fan, Senior Member, IEEE, Khale Ben Letaief, Fellow, IEEE arxiv:1411.6087v1 [cs.it]
More informationMeasurement of Semi-Anechoic Chamber Using Modified VSWR method above 1GHz
Measurement of Semi-Anechoic Chamber Using Moifie VSWR metho above 1GHz M. Bittera, K. Kováč, J. Hallon Department of Measurement, Faculty of Electrical Engineering an Information Technology, Slovak University
More informationREPORT 2/9_12_2001 Position Error Signal Estimation at High Sampling Rates Using Data and Servo Sector Measurements Abstract
REPORT 2/9_12_2001 Position Error Signal Estimation at High Sampling Rates Using Data an Servo Sector Measurements by Petros A. Ioannou an Elias B. Kosmatopoulos Department of Electrical Engineering Systems
More informationJitter Limitations on a Gigabit Copper Multi- Carrier System
Jitter Limitations on a Gigabit Copper Multi- Carrier System Jan H. Rutger Schraer, Eric A.M. Klumperink, Jan L. Visschers, Bram Nauta University of Twente, IC-Design Group, P.O. Box 7, 75 AE, Enschee,
More informationAn Analysis of Reliable MAC Layer Multicast in Wireless Networks
An Analysis of Reliable MAC Layer Multicast in Wireless etworks Yoooc Song, Junho Chung, Wookyung Sung, Bosung Kim, Dowon Hyun an Juwook Jang Department of lectronic ngineering, Sogang University. mail:
More informationA Cost Analysis of Wireless Mesh Networks
04 th International Symposium on Moeling an Optimization in Mobile, A Hoc, an Wireless Networks (WiOpt) A Cost Analysis of Wireless Mesh Networks Valerio Targon Queen Mary University of Lonon & Alpen-Aria-Universität
More informationEnergy Detection Technique in Cognitive Radio System
International Journal of Engineering & Technology IJET-IJENS Vol:13 No:05 69 Energy Detection Technique in Cognitive Radio System M.H Mohamad Faculty of Electronic and Computer Engineering Universiti Teknikal
More informationForce Control of Flexible Catheter Robots for Beating Heart Surgery
Force Control o Flexible Catheter Robots or Beating Heart Surgery Samuel B. Kesner, Stuent Member, IEEE, an Robert D. Howe, Senior Member, IEEE Abstract Recent evelopments in cariac catheter technology
More informationPrincipal Component Analysis-Based Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing
Principal Component Analysis-Base Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing Xin He 1, Yashwant Malaiya 2, Anura P. Jayasumana 1 Kenneth P. Parker 3 an Stephen Hir
More informationOverhead Energy Considerations for Efficient Routing in Wireless Sensor Networks
Overhea nergy Consierations for fficient Routing in Wireless Sensor Networks. Ilker Oyman an Cem rsoy Computer ngineering Department, Bogazici University, Istanbul, Turkey {oymani, ersoy}@boun.eu.tr Abstract
More informationProfessor of Computer Engineering, Shobra Faculty of Engineering, Benha University, Cairo,Egypt, Cairo,Egypt
Visible Light Communication (VLC) Channel Moeling [1] M.Mohanna, [2] Raafat A.EL-Kammar, [3] M.LotfyRabeh, [4] Mohame I.Gabr [1] Professor, National Research Institute an Geophysics, Cairo, Egypt [2] Professor
More informationWave-Induced Fluctuations in Underwater Light Field: Analysis of Data from RaDyO Experiments
DISTRIBUTION STATEMENT A. Approve for public release; istribution is unlimite. Wave-Inuce Fluctuations in Unerwater Light Fiel: Analysis of Data from RaDyO Experiments Dariusz Stramski Marine Physical
More informationImprovement of Power Factor and Harmonic Reduction with VSC for HVDC System
International Journal of Engineering an Management Research, Volume-3, Issue-2, April 2013 ISSN No.: 2250-0758 Pages: 6-12 www.ijemr.net Improvement of Power Factor an Harmonic Reuction with VSC for HVDC
More informationA NEW SPEECH ENHANCEMENT TECHNIQUE USING PERCEPTUAL CONSTRAINED SPECTRAL WEIGHTING FACTORS
A NEW SPEECH ENHANCEMENT TECHNIQUE USING PERCEPTUAL CONSTRAINED SPECTRAL WEIGHTING FACTORS T. Muni Kumar, M.B.Rama Murthy, Ch.V.Rama Rao, K.Srinivasa Rao Gulavalleru Engineering College, Gulavalleru-51356,
More informationEXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT
EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT Timothy W. McLain Ranal W. Bear Je M. Kelsey Department of Mechanical Engineering, Brigham Young University, Provo, Utah 86 Department
More informationMobile radio propagation path loss simulation for two districts of different buildings structures in Mosul-city
Vol.7 No.1, 211 مجلد 7, العدد 1, 211 gy, y,, q Moile raio propagation pat loss simulation or two istricts o ierent uilings structures in Mosul-city Fara E. Mamoo Electrical Dept. college Eng. IEEE. Memer
More informationBreaking the Interference Barrier in Dense Wireless Networks with Interference Alignment
Breaking the Interference Barrier in Dense Wireless Networks with Interference Alignment Konstantinos Dovelos an Boris Bellalta Universitat Pompeu Fabra (UPF, Barcelona Abstract arxiv:1710.11458v2 [cs.ni]
More informationINTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
ITERATIOAL JOURAL OF ELECTROICS AD COMMUICATIO EGIEERIG & TECHOLOGY (IJECET) ISS 976 6464(Print) ISS 976 6472(Online) Volume 3, Issue 3, October- December (22), pp. 49-59 IAEME: www.iaeme.com/ijecet.asp
More informationCognitive Ultra Wideband Radio
Cognitive Ultra Wideband Radio Soodeh Amiri M.S student of the communication engineering The Electrical & Computer Department of Isfahan University of Technology, IUT E-Mail : s.amiridoomari@ec.iut.ac.ir
More information