A Primary User Emulation Attack Countermeasure Strategy and Energy-Efficiency Analysis in Cognitive Radio Networks

Size: px
Start display at page:

Download "A Primary User Emulation Attack Countermeasure Strategy and Energy-Efficiency Analysis in Cognitive Radio Networks"

Transcription

1 Journal o Communications Vol., No., January 7 A imary User Emulation Attack Countermeasure Strategy an Energy-Eiciency Analysis in Cognitive Raio Networks unchuan Wang, Xiaorong Xu, Weiwei Wu, an Jianrong Bao College o Telecommunication Engineering, angzhou Dianzi University, angzhou, Zheiang 38, China waynetlg@oxmail.com; xuxr@hu.eu.cn; @63.com; baor@hu.eu.cn Abstract Due to the act that security an energy eiciency are investigate separately in the conventional imary User Emulation Attack (PUEA) countermeasure strategy in Cooperative Spectrum Sensing (CSS) process, the traeo between security an energy eiciency is iscusse in this paper. CSS can improve etection perormance whereas energy consumption will ramatically boost up with the increasing o cooperative users. To tackle this problem, we set CSS energy eiciency in the presence o PUEA as optimal obective, whereas secure etection perormance an secure alse alarm threshol as the constraint conitions. The optimal problem is resolve to achieve a trae-o between energy eiciency an security in the presence o PUEA attack. The optimal usion threshol K an optimal cooperative user numbers can be obtaine in secure CSS with energy eiciency maximization, which guarantees energy eiciency as well as secure CSS etection perormance. The propose PUEA countermeasure strategy etection perormance is presente an compare with traitional Maximum Ratio Combining (MRC) usion rule. Simulation results show that, the propose strategy is immune to PUE intererence power, an it provies high robustness to PUEA attack, which implements the trae-o between security an energy eiciency in Cognitive Raio Network (CRN) eectively. by overlay or unerlay approaches with the premise o not aecting the authorize imary User (PU) normal communications. CR technology has greatly reuce the constraints o spectrum an banwith or the evelopment o wireless technology. It has become one o the potential key technologies in the 5G stanars [], []. CRN is one o the key technologies o 5G [3], owever, CRN is an open network environment, which is particularly vulnerable to malicious user attack. CRN not only aces the conventional wireless network security threats, such as eavesropping attack, tampering ata, etc [4], [5], but also conronts with some new threats such as PUEA [5] an Spectrum Sensing Data Falsiication (SSDF) [6]. The traitional wireless network security problems coul be mainly solve by the encryption o transmitting signals [3], [4], [7]. owever, energy consumption was signiicantly increase in secure transmission ue to the complexity o encryption algorithm an key management mechanism. ence, physical layer (P) security was regare as complement or substitution o conventional encryption techniques, which ha rawn much attention by network security researchers [8]-[]. The basic iea o P security is to make use o the ranom eature o the noisy channel to ensure that malicious users can not obtain transmit message rom the channel. In other wors, P security uses the inherent uncertainty o the noisy channel, in orer to ensure CRN ata security. P security consiere the security rom inormation theory an signal processing perspectives [8], [9]. P security containe two aspects. On the one han, CRN security capacity was theoretically analyze rom the inormation theory perspective. On the other han, secure transmit rates to achieve security capacity was investigate rom signal processing an optimization perspective [9], []. owever, CRN requires more on energy eiciency an system security in the pursuit o high spectrum utilization an high transmission eiciency. Recent research showe that, energy consume in spectrum sensing phase an ata transmission phase were the main energy cost in CRN []. With the increasing o SU ensity an the expansion o network coverage area, CRN energy consumption problem has rawn much attention. Namely, Green Communications has become one o the Inex Terms Cooperative Spectrum Sensing (CSS), imary User Emulation Attack (PUEA), countermeasure strategy, energy eiciency, etection perormance I. INTRODUCTION Cognitive Raio (CR) is a promising technique that enables a smart exploitation o the unuse portions o the license spectrum. In Cognitive Raio Networks (CRN), Seconary User (SU) can aaptively aust the operational parameters (such as the transmit power, carrier requency an moulation metho) via sensing the external wireless environments. SU can access to the authorize spectrum to realize ynamic spectrum sharing Manuscript receive August 3, 6; revise January, 7. This work was supporte in part by the ogram o Zheiang ovincial Natural Science Founation o China (Grant No. L5F8, LZ4F3), National Natural Science Founation o China (Grant No. 6475), the Grauate Scientiic Research Founation o angzhou Dianzi University in 6 (ZX663835) an oung Talent Cultivation oect o Zheiang Association or Science an Technology (Grant No. 6CGC9). Corresponing author xuxr@hu.eu.cn. oi:.7/cm Journal o Communications

2 Journal o Communications Vol., No., January 7 evelopment trens or CRN in the uture. Green CRN is the research hotspot in CR at present. It is also one o the key techniques to realize uture energy eiciency wireless communications [], []. In aition, ue to two ierent network architectures existe in CRN, namely, primary network an cognitive network, ata transmission security issue has become a new research irection in the iel o CRN [7]-[9]. P security is the emphasis in energy-eicient CRN. In [], the authors pointe out that there is an optimal trae-o between energy eiciency an transmission security in CRN. The system aopts ierent P security strategies in accorance with ierent malicious attacks, thus energy consumption varies or ierent security schemes. Thereore, in orer to ensure secure an reliable transmission, it is necessary to iscuss the optimal energy-eicient security strategy or a speciic attack. Re. [8] an Re. [9] investigate the common malicious attacks an the corresponing countermeasure strategies in CRN. In CRN spectrum sensing phase, SUs irstly ientiy legitimate SUs an malicious SUs. The presence o malicious SUs will inluence the accuracy o secure cooperative spectrum sensing [5], [6]. A propose scheme in [6] mainly stuie the trae-o between energy eiciency an security or SSDF attack. The scheme eectively etecte channel availability through reporting message authentication coe (MAC) to the usion center. owever, ash unction was require to generate MAC in this scheme, which inevitably resulte in the increasing o complexity. Furthermore, the propose scheme in t consier the inluence o legitimate SUs reporting error rate as well as reporting istance to CSS energy consumption [6]. In [5], the authors stuie eective CSS in the presence o PUEA. Local sensing inormation rom ierent SU was weighte at the usion center. The weights coul be optimize by maximizing the etection probability uner a constraint o alse alarm probability. Meanwhile, the inluence o channel estimation error on CSS etection perormance was also iscusse. In [3], the authors investigate PUEA attack an its countermeasure strategy in mobility CRN scenario. A hybri strategy base on PUEA countermeasure with CSS etection was propose, which was satisie the requirements o alse alarm probability an the etection perormance in PUEA attack with lower energy consumption. At the same time, the overall perormance o PUEA problem with game theory analysis was presente in the conitions o ierent attack overhea an etection overhea, which coul reuce the total resource consumption an increase CRN throughput [3], [4]. At present, P security in spectrum sensing phase mainly ocuses on the PUEA or SSDF countermeasure strategies [4], [5], [7]-[9], [3], [4]. Aime to the trae-o between security an energy eiciency in CRN, the paper mainly ocuses on energy-eicient PUEA 7 Journal o Communications countermeasure strategy with perormance analysis [3], [6], [], [5]. Speciically, energy eiciency o the propose PUEA countermeasure strategy is erive in etail. Energy eiciency is set as the optimal obective, whereas secure etection probability an secure alse alarm threshol as the constraint conitions. Then, the optimal usion threshol K an optimal SU number N are presente to achieve the maximization o energy eiciency by resolving the optimization problem, which guarantees energy eiciency as well as secure CSS etection perormance. The rest o this paper is organize as ollows, Section II escribes the system moel. Secure CSS uner PUEA is escribe in etail in the Section III. Section IV escribes the propose countermeasure strategy against PUEA an analyzes its energy eiciency perormance. Simulation results are presente an iscusse in Section V. Finally, conclusions are rawn in Section VI. II. SSTEM MODEL In this paper, we consier CSS in a CRN where N SUs trying to access a target spectrum. As shown in Fig., to avoi conlict with the PU, each SU etects the target spectrum within a speciic perio an uges whether the spectrum is occupie by PU or not. Then, SUs report local etection results to the Fusion Center (FC). Finally, the FC makes global etection to ecie whether the spectrum is occupie by PU via speciic usion rule. The PUE attacker mimics the eature o PU an launches the PU signal to eceive SUs, which makes SUs to uge that PU is occupying the authorize spectrum. Thereore, SUs are orce to switch to another spectrum holes. The key issue to een PUEA is that SUs shoul ientiy PU an PUEA, an make right ugment on PU an PUEA signals [5], [3], [4]. In this paper, energy etection is implemente in SU local etection, an har usion with K-out-o-N usion rule is applie at FC. It is assume that the report channels rom SUs to the FC are noisy. imary user PUE attacker Seconary user SU SU SU3 SUN Channel between attacker an seconary user Channel between primary an seconary user an reporting Fusion Center channel Fig.. System moel o cooperative spectrum sensing with PUEA in CRN. III. COOPERATIVE SPECTRUM SENSING IN TE PRESENCE OF PUEA SU local spectrum sensing consists o three common techniques. Namely, energy etection, matche iltering

3 Journal o Communications Vol., No., January 7 etection an cyclo-stationary eature etection [], []. In this paper, we use energy etection to uge the authorize spectrum utilization. Due to the presence o PUEA, or N, the signal receive by the th SU at the ith (i M ) time instant [5] can be written as P h x ( i) w ( i), y () i P h x ( i) P h x ( i) w ( i), m m, m, p p, p, m m, m, We enote that when PUEA is present, the absence an presence o PU can be expresse as two hypotheses respectively, that is, an. Signals transmitte by PU an PUE attacker with power P p an P m are x i an x, () i respectively. PU signal x, () i is p, () m assume to be inepenently an ientically istribute (i.i.) complex Gaussian ranom variable with zero mean an unit variance. Due to the similarity between malicious an primary signal in PUEA, the attacker s signal xm, () i also ollows the complex Gaussian istribution. hp, an hm, enote the instantaneous channel gain rom primary user to the th seconary user an rom PUE attacker to the th seconary user, respectively. In aition, all the channel links are assume as block aing channel, that is, hp, an h m, are constant within one time interval. w () i enotes the aitive white Gaussian noise at the th seconary user with zero mean an variance. The signal-to-noise ratio (SNR) receive at the th SU can be expresse as = h. p, w In this paper, we aopt energy etection metho in which M samples o signal energy are ae uring one etection interval, the power etecte by the th SU can be expresse as m, () w p M y ( i). Due to p, () i () x i an x i ollow the complex Gaussian istribution with zero mean an unit variance, the ecision statistic subect to the central Chi-square ( ) istribution with M egrees o reeom [6] where an respectively M ~ M ( ) y () i () i ~ M ( ) are the variance or an Ph m m, w P h P h p p, m m, w is (3) In spectrum sensing, alse alarm probability an etection probability eine as over one etection interval are (4) where is etection threshol. ence, the alse alarm probability an etection probability at the th SU are expresse as [], [], [7] ( M, ) ( M, ) Each SU issues a local binary ecision, the spectrum status. I (5) about, then, which enotes that the spectrum is occupie by PU. Otherwise, the spectrum is ientiie as unuse by PU [], [], [7]. All local ecisions are reporte to the FC via reporting channels. At the FC, a speciic usion rule (FR) is employe to process these ecisions in orer to make the inal global ecision. In this paper, we use K-out-o-N rule, where K is a preeine threshol on the number o SUs who etect PU on the spectrum (K N ). The iea behin this rule is to compare the number o SUs that report with K. I it is less than K, then the spectrum is unuse by PU. Otherwise, the spectrum is use by PU. In this paper, the reporting channel between SU an FC is assume to be noisy, which can be moelle as binary symmetric channel with error probability e, hence, we can moiy the expression o an as below [8]. ( ) ( P x e ( ) ( P y e The overall etection probability ( alse-alarm probability ( respectively as ollows N ( ) N ( ) N N x x K N N y y K (6) (7) ) an overall ) can be expresse IV. ENERG EFFICIENC ANALSIS OF PUEA COUNTERMEASURE STRATEG (8) Energy eiciency ( ) can be eine as the ratio o average throughput in bits to average energy consumption in Joule. The average throughput is eine as average number o successully transmitte bits, an the average consume energy is the energy consume uring CSS an reporting results transmission in the reporting phase. The average throughput can be expresse as ollows Th ( ) R (9) 7 Journal o Communications 3

4 Journal o Communications Vol., No., January 7 where is the probability that the spectrum is not occupie by PU. R enotes the ata rate, an T is the ata transmission time interval. The actor ( ) in (9) represents the probability o successul elivering the transmit ata. The average energy consumption by all SUs is given as ollows where es E Ne e () s unuse t is the energy consume uring CSS by one SU, an et is the energy consume uring reporting phase. Note that transmission occurs only i the spectrum is ientiie as unuse. Thus, unuse can be given as ollows ( ) ( ) unuse () where. Thereore, energy eiciency o eense strategy against PUEA can be expresse as ollows ( ) RT Ne e ( ) s t () The optimization o K or energy eiciency in the propose PUEA countermeasure strategy with constraint conitions on the an, which can be state as below ( ) RT max max K K Ne e ( ) s.t. an s t (3) The K value that satisies (3) without the constraint can be obtaine by the erivative o obective into zero, namely RT K Ne e ( ) s t ( ) RTet K K Nes et ( ) The erivatives o approximately as ollows an (4) can be written N ( K ) ( K) y ( y ) K K N ( K ) ( K) x ( x ) K K K N K K N K (5) Substitute (5) into (4) with some mathematical calculations, the optimal K that maximizes the energy eiciency can be presente in a close orm shown as below Ne s et ( ) y ln N ln et ( ) x K (6) x( y) ln y ( x ) ence, or a given N an a given alse alarm probability, the etection probability ecrease as K increases, the optimal K that maximizes energy eiciency while ulilling the etection probability requirements can be written as below. Kopt min K, K (7) where the value o the K that satisies the constraint conition in CSS etection. From [7], we can get the approximate expression o K shown as below. K N N (8) ( ) x( x) x.5 V. SIMULATION RESULTS AND ANALSIS In this section, we analyze the simulation perormance o the propose PUEA countermeasure strategy with energy eiciency optimization. We assume that there is one PUE attacker in the propose scheme. Sensing channels an reporting channels are i.i.. The number o samples within a etection interval is M 3 [5]. All simulation parameters are summarize in Table I. These parameters are assume to be ientical among all SUs. TABLE I: SIMULATION PARAMETERS Parameters Values Parameters Values N.6..5 e s Joule e t Joule T.3 sec R Kbps Fig. shows the receiver operation characteristics (ROC) perormance when the FC uses har FR or CSS in the presence o PUEA. In this igure, the average SNR is set to be B an the transmitting power o primary user an PUE attacker are ientical P P. From Fig., we in that the etection probability o non-cooperation scheme is severely reuce by PUEA attack. When we use K-out-o-N FR in FC, a signiicant etection perormance improvement is achieve, even better than the non-cooperation scheme when the PUE attacker is absent. From Fig., we can in that when we use K-out-o-N rule, or a given N, the threshol K also have great impact on the etection perormance. When the alse alarm probability is ixe, the overall etection perormance shows better with the ecreasing o threshol K. The reason is that the FR approaches to OR rule with the ecreasing o K, so that the overall etection perormance is enhance. p m 7 Journal o Communications 4

5 Journal o Communications Vol., No., January 7 Fig. 3 shows energy eiciency o the propose PUEA countermeasure strategy with a set o ierent threshol K an SU noes N. In this igure, the average SNR is set to be B, the constraint conitions are.6 an.. It is shown that, the maximum energy eiciency o the propose PUEA countermeasure 4 strategy achieves to 7.8 bit/ Joule with N 5 an K. As shown in Fig. 3, we can also in that the threshol K that achieves to the maximum energy eiciency increases with the increasing o SU noes in CSS. In aition, with the increasing o SU noes, the achievable maximum energy eiciency is lower. The reason is that, more SU noes will increase the energy consumption in the process o CSS an reporting phase, which will ecrease energy eiciency. Detection probability, No cooperation,attack No cooperation,no attack an rule or rule K=,N=6 K=4,N= False alarm probability, Fig.. ROC o CSS with har usion rule in the presence o PUEA. Energy Eiciency [bit/joule] x 4 N=4 N=5 N=6 N=7 N=8 N= K Fig. 3. Energy eiciency o the propose strategy with ierent K an N. From perormance analysis in Fig. 3, we oun that the propose PUEA countermeasure strategy can achieve the maximum energy eiciency with SU number N 5 an the optimal threshol K. Fig. 4 shows the ROC perormance o non-cooperation, K-out-o-N rule an MRC with/without PUEA attack. For the same FR, ROC perormance without PUEA is better than that with PUEA. When the PUE is present, or the same alse alarm probability, the etection probability o the propose PUEA countermeasure strategy with K-out-o-N FR outperorms the MRC scheme. When., the etection perormance o the propose strategy shows even better than the non-cooperation scheme without PUEA. owever, alse alarm probability increases with the increasing o etection probability. ence, it s necessary to make a trae-o between alse alarm probability an etection probability to ensure the ROC perormance o secure CSS. Fig. 5 shows secure CSS etection perormance o the propose PUEA countermeasure strategy in the presence o PUEA with ierent power ratio between PUE an PU. We eine the transmit power ratio between PUE an PU as P p (9) P Eq. (9) normalizes PUE attacker s power in terms o PU s power. A larger value o p inicates PUE attacker has more transmit power. In this igure, or a given alse alarm probability threshol., the SNR threshols or each SU are ientical. Secure CSS etection perormance o the propose scheme is compare with MRC scheme whereas p is set to be.// respectively. As p increases rom. to, etection perormance o both schemes are ecrease. p inicates PUE power is ominant over the noise power. ence, the etection perormance is eteriorate even when the average SNR is very high. We also in that the etection perormance o the propose secure CSS scheme base on K-out-o-N FR outperorms MRC FR signiicantly. What s more, the etection perormance o propose scheme is almost inepenent o the value p. That is, PUE power has harly aecte the propose PUEA countermeasure strategy, which inicates the propose scheme ensures the security o CSS eectively, an the propose scheme has robustness to een PUEA attack. m p VI. CONCLUSIONS This paper investigates secure CSS strategy that ensures energy eiciency an P layer security in CSS spectrum sensing uner the presence o PUEA in the CRN. We obtain the optimal threshol K an optimal SU numbers N o secure CSS base on K-out-o-N FR via the solution o energy eiciency optimization problem, in orer to ensure the CSS etection perormance simultaneously. In aition, we analyze the ROC perormance with the consieration o optimal energy eiciency. With the comparison o MRC FR, it is apparent that secure etection perormance o the propose scheme with K-out-o-N FR outperorms MRC FR scheme in terms o the same alse alarm probability scenario. Detection perormance o the propose PUEA countermeasure strategy can be signiicantly enhance in 7 Journal o Communications 5

6 Journal o Communications Vol., No., January 7 high SNR region. The propose scheme is almost immune to PUE intererence power, which ensures CSS security. Thereore, the propose strategy has higher robustness to PUEA attack, an it makes a trae-o between energy eiciency an etection perormance eectively. Detection probability, No cooperation,attack No cooperation,no attack. K=,N=5,attack K=,N=5,no attack. MRC,no attack MRC,attack False alarm probability, Fig. 4. ROC perormance o non-cooperation K-out-o-N rule an MRC with/without PUEA attack. Detection probability, MRC,p= MRC,p=. MRC,p= K=,N=5,p=. K=,N=5,p= K=,N=5,p= SNR(B) Fig. 5. Detection perormance o the propose PUEA countermeasure strategy with ierent power ratios. ACKNOWLEDGMENT The authors woul like to greatly appreciate anonymous reviewers or their valuable comments an constructive suggestions in helping to improve the quality o this paper. REFERENCES [] I. F. Akyiliz, W.. Lee, M. C. Vuran, an S. Mohanty, Next generation/ynamic spectrum access/cognitive raio wireless networks: A survey, Computer Networks, vol. 5, no. 3, pp. 7-59, September 6. [] I. F. Akyiliz, B. F. Lo, an R. Balakrishnan. Cooperative spectrum sensing in cognitive raio networks: A survey, Physical Communications, vol. 4, no., pp. 4-6, March. [3] X. ong, J. Wang, an C. X. Wang. Cognitive Raio in 5G: A perspective on energy-spectral eiciency traeo, IEEE Communication Magazine, vol. 5, no. 7, pp , 4. [4] T. Chen an G. Wei. Stuy on physical layer security o wireless networks, Doctoral Dissertation o South China University o Technology, 3. [5] C. Chen,. Cheng, an. D. ao. Cooperative spectrum sensing in cognitive raio networks in the presence o the primary user emulation attack, IEEE Transactions on Wireless Communications, vol., no. 7, pp. 35-4,. [6] S. Althunibat, V. Sucasas,. Marques, J. Roriguez, R. Taazolli, an F. Granelli, On the traeo between security an energy eiciency in cooperative spectrum sensing or cognitive raio, IEEE Communications Letters, vol. 7, no. 8, pp , 3. [7]. N. Li. Research on security an privacy in cognitive raio networks, Doctoral Dissertation o Xiian University, 3. [8] Z. Shu,. ian, an S. Ci. On physical layer security or cognitive raio networks, IEEE Network, vol. 7, no. 3, pp. 8-33, 3. [9] J. Li, Z. Feng, Z. Feng, an P. Zhang, A survey o security issues in cognitive raio networks, China Communications, vol., no. 3, pp. 3-5, 5. []. Zou, X. Wang, an W. Shen, Physical-layer security with multi-user scheuling in cognitive raio networks, IEEE Transactions on Communications, vol. 6, no., pp , 3. [] J. Wang, J.. Zhao, an J. J. Du, Survey on cognitive raio green networks with cross-layer technology, Telecommunication Science, vol. 3, no. 3, pp. 4-9, 4. [] S. Eryigit, G. Gur, S. Bayhan. Energy eiciency is a subtle concept: Funamental traeos or cognitive raio networks, IEEE Communication Magazine, vol. 5, no. 7, pp.3-36, 4. [3] F. J. Bao. Research on primary user emulation attack an countermeasures with mobile seconary users in cognitive raio networks, Master Dissertation o Zheiang University, 3. [4] F. Bao, L. Xie, an. Chen, Analysis o primary user emulation attack with motional seconary users in cognitive raio networks, in oc. IEEE 3r International Symposium on Personal Inoor an Mobile Raio Communications, September, pp [5] C. Comaniciu an. V. Poor, On energy-secrecy traeos or Gaussian wiretap channels, IEEE Transactions on Inormation Forensics an Security, vol. 8, no., pp , 3. [6] J. ang,, Chen, W. Shi, X. Dong, an T. Peng. Cooperative spectrum sensing against attacks in cognitive raio networks, in oc. IEEE International Conerence on Inormation an Automation, 4, pp [7] S. Althunibat, M. Di Renzo, an F. Granelli, Optimizing the K-out-o-N rule or cooperative spectrum sensing in cognitive raio networks, in oc. IEEE Global Communications Conerence (IEEE Globecom 3) Communications os, Reliability an Moeling Symposium, 3, pp [8] X. Xu, J. Bao,. Luo, an. Wang, Cooperative wieban spectrum etection base on maximum 7 Journal o Communications 6

7 Journal o Communications Vol., No., January 7 likelihoo ratio or CR enhance VANET, Journal o Communications, vol. 8, no., pp. 84-8, 3. unchuan Wang is with the College o Telecommunication Engineering, angzhou Dianzi University (DU), angzhou, China, as master. e receive the B. Eng. egree in Communication Engineering rom Tianin University o Technology, Tianin, China, in 5. e is currently working towar his Master egree in the College o Telecommunication Engineering, DU. is research interests emphasize on energy eiciency an P security in Cognitive Raios (CR). Xiaorong Xu is with the College o Telecommunication Engineering, angzhou Dianzi University (DU), angzhou, China, as associate proessor an master supervisor. e receive the B. Eng. egree in Communication Engineering an M. Eng. egree in Communication an Inormation System rom DU, angzhou, China, in 4 an 7, respectively. e receive Ph.D. egree maor in Signal an Inormation ocessing rom Naning University o Posts an Telecommunications (NJUPT), Naning, China, in. eviously, rom to 3, he was working as a postoctoral researcher in the Institute o Inormation an Communication Engineering, Zheiang University (ZJU), angzhou, China. During 3-4, he serve as a research scholar with the Electrical an Computer Engineering Department, Stevens Institute o Technology (SIT), oboken, NJ, USA. Currently, he is working as an associate proessor an master supervisor in DU. Dr. Xu s research interests emphasize on energy eiciency an P security in Cognitive Raios (CR) an energy eiciency in cooperative communications, etc. Weiwei Wu is with the College o Telecommunication Engineering, angzhou Dianzi University (DU), angzhou, China, as master. e receive the B. Eng. egree in Communication Engineering rom Anhui University o Technology, Anhui, China, in 5. e is currently working towar his Master egree in the College o Telecommunication Engineering, DU. is research interests emphasize on energy eiciency an optimal resource allocation in Cognitive Raios (CR). Jianrong Bao is with the College o Inormation Engineering, angzhou Dianzi University (DU), angzhou, China, as associate proessor, e receive the B. Eng. egree in Polymer Material Engineering an M. Eng. egree in Communication an Inormation System rom Zheiang University o Technology, angzhou, China, in an 3, respectively. e receive Ph.D. egree maor in Communication an Inormation System rom Tsinghua University, Beiing, China, in 9. eviously, rom to 3, he was working as a postoctoral researcher in the Institute o Inormation an Communication Engineering, Zheiang University (ZJU), angzhou, China. Currently, he is working as associate proessor in DU. Dr. Bao s research interests emphasize on energy eiciency in Cognitive Raios (CR) an cooperative communications, etc. 7 Journal o Communications 7

Joint Cooperative Relaying and Jamming for Maximum Secrecy Capacity in Wireless Networks

Joint Cooperative Relaying and Jamming for Maximum Secrecy Capacity in Wireless Networks Joint Cooperative Relaying an Jamming for Maximum Secrecy Capacity in Wireless Networks Li Wang, Chunyan Cao, Mei Song an Yu Cheng Beijing Key Laboratory of Work Safety Intelligent Monitoring School of

More information

SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS

SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS Xiaohua Li 1 1 Department of ECE State University of New York at Binghamton Binghamton, NY 139, USA {xli,jhwu1}@binghamton.eu

More information

Energy-Efficient Infrastructure Sensor Network for Ad Hoc Cognitive Radio Network

Energy-Efficient Infrastructure Sensor Network for Ad Hoc Cognitive Radio Network 1 Energy-Eicient Inrastructure ensor Network or A Hoc Cognitive Raio Network Muhamma Usman, Dongsoo Har, enior Member, IEEE, an Insoo Koo, Member, IEEE Abstract We propose an energy-eicient network architecture

More information

Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users

Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users D. Richar Brown III Electrical an Computer Engineering Department Worcester Polytechnic Institute Worcester,

More information

Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks

Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks Efe F. Orumwense 1, Thomas J. Afullo 2, Viranjay M. Srivastava 3 School of Electrical, Electronic and Computer Engineering,

More information

The Analysis and Complementarity of Abbe Principle Application Limited in Coordinate Measurement

The Analysis and Complementarity of Abbe Principle Application Limited in Coordinate Measurement Proceeings of the Worl Congress on Engineering 00 Vol III The Analysis an Complementarity of Abbe Principle Application Limite in Coorinate Measurement Fei Yetai, Shang Ping, Chen Xiaohuai, Huang Qiangxian

More information

Effect of Carrier Frequency Offset on the BER Performance of Variable Spreading Factor OFCDM Systems

Effect of Carrier Frequency Offset on the BER Performance of Variable Spreading Factor OFCDM Systems This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the ICC 008 proceeings. Effect of Carrier Frequency Offset on the erformance

More information

MULTI-STAGES CO-OPERATIVE/NON- COOPERATIVE SCHEMES OF SPECTRUM SENSING FOR COGNITIVE RADIO SYSTEMS

MULTI-STAGES CO-OPERATIVE/NON- COOPERATIVE SCHEMES OF SPECTRUM SENSING FOR COGNITIVE RADIO SYSTEMS MULTI-STAGES CO-OERATIVE/NON- COOERATIVE SCHEMES OF SECTRUM SENSING FOR COGNITIVE RADIO SYSTEMS Anwar Mousa 1 an Tara Javii 2 University o Caliornia, San Diego (UCSD)- Jacobs School o Engineering 9500

More information

Research Article A Novel Approach to Wideband Spectrum Compressive Sensing Based on DST for Frequency Availability in LEO Mobile Satellite Systems

Research Article A Novel Approach to Wideband Spectrum Compressive Sensing Based on DST for Frequency Availability in LEO Mobile Satellite Systems Hinawi Publishing Corporation Mathematical Problems in Engineering Volume 26, Article ID 83972, 3 pages http://x.oi.org/.55/26/83972 Research Article A Novel Approach to Wieban Spectrum Compressive Sensing

More information

Cooperative Spectrum Sensing in Cognitive Radio

Cooperative Spectrum Sensing in Cognitive Radio Cooperative Spectrum Sensing in Cognitive Radio Project of the Course : Software Defined Radio Isfahan University of Technology Spring 2010 Paria Rezaeinia Zahra Ashouri 1/54 OUTLINE Introduction Cognitive

More information

A New GNSS Acquisition Method with Signal Down Sampling in Frequency Domain

A New GNSS Acquisition Method with Signal Down Sampling in Frequency Domain A ew SS Acquisition Metho with Signal Down Sampling in Frequency Domain Feng Xu an Yang ao, eomatics Engineering, University o Calgary, 5 University Drive,.W., Calgary, AB, Canaa School o eoesy an eomatics,

More information

Capacity Gain from Transmitter and Receiver Cooperation

Capacity Gain from Transmitter and Receiver Cooperation Capacity Gain from Transmitter an Receiver Cooperation Chris T. K. Ng an Anrea J. Golsmith Dept. of Electrical Engineering Stanfor University, Stanfor, CA 90 Email: ngctk, anrea}@wsl.stanfor.eu arxiv:cs/00800v1

More information

Dynamic Hybrid Duplex for Rate Maximization in OFDMA. Sangmin Oh and Chae Y. Lee

Dynamic Hybrid Duplex for Rate Maximization in OFDMA. Sangmin Oh and Chae Y. Lee Dynamic Hybri Duplex for Rate Maximization in OFDMA Sangmin Oh an Chae Y. Lee Dept. of Inustrial Engineering, KAIST, 373-1 Kusung Dong, Taeon, Korea Tel: +82-42-350-5916, FAX: +82-42-350-3110 Email: {sangmin.oh,

More information

For Review Only. WITH the proliferation of cloud computing, data center

For Review Only. WITH the proliferation of cloud computing, data center Page o Journal o Lightwave Technology 0 0 0 0 Lightpath Management in SDN-Base Elastic Optical Networks with Power Consumption Consierations Yu Xiong,, Jin Shi, Yaya Yang, Yi Lv, George N. Rouskas, Key

More information

SUBSET: A Joint Design of Channel Selection and Channel Hopping for Fast Blind Rendezvous in Cognitive Radio Ad Hoc Networks

SUBSET: A Joint Design of Channel Selection and Channel Hopping for Fast Blind Rendezvous in Cognitive Radio Ad Hoc Networks SUBSET: A Joint esign of Channel Selection an Channel Hopping for Fast Blin enezvous in Cognitive aio A Hoc Networks Xingya Liu an Jiang Xie epartment of Electrical an Computer Engineering The University

More information

Joint Partial Relay Selection, Power Allocation and Cooperative Maximum Likelihood Detection for MIMO Relay Systems with Limited Feedback

Joint Partial Relay Selection, Power Allocation and Cooperative Maximum Likelihood Detection for MIMO Relay Systems with Limited Feedback Joint Partial Relay Selection, Power Allocation an Cooperative Maximum Likelihoo Detection for MIMO Relay Systems with Limite Feeback Thomas Hesketh, Rorigo C. e Lamare, Stephen Wales Department of Electronics,

More information

IN GENERAL, an optical network can consist of a

IN GENERAL, an optical network can consist of a 1 Geometric Capacity Provisioning for Wavelength-Switche WDM Networks Li-Wei Chen, Eytan Moiano Abstract In this paper, we use an asymptotic analysis similar to the sphere-packing argument in the proof

More information

Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimedia Networks

Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimedia Networks Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimeia Networks Zhengguo Sheng, Jun Fan, Chi Harol Liu, Victor C. M. Leung, Xue Liu*, an Kin K. Leung Orange Labs, France Telecom,

More information

Power-Aware Lightpath Management for SDN-Based Elastic Optical Networks

Power-Aware Lightpath Management for SDN-Based Elastic Optical Networks 1 Power-Aware Lightpath Management or SDN-Base Elastic Optical Networks Yu Xiong, Jin Shi, Yi Lv, George N. Rouskas Key Laboratory o Optical Communication an Networks, Chongqing University o Posts an Telecommunications,

More information

Cache-Aided Content Delivery in Fog-RAN Systems with Topological Information and no CSI

Cache-Aided Content Delivery in Fog-RAN Systems with Topological Information and no CSI Cache-Aie Content Delivery in Fog-RAN Systems with Topological Information an no CSI Wei-Ting Chang, Ravi Tanon, Osvalo Simeone Abstract In this work, we consier a Fog Raio Access Network (F-RAN) system

More information

Using Chaos to Detect IIR and FIR Filters

Using Chaos to Detect IIR and FIR Filters PIERS ONLINE, VOL. 6, NO., 00 90 Using Chaos to Detect IIR an FIR Filters T. L. Carroll US Naval Research Lab, Coe 66, Washington, DC 07, USA Abstract In many signal processing applications, IIR an FIR

More information

ROC Analysis of BLM Detector in AF Relays Based Cooperative Wireless Networks Omar GATERA 1, Ahmet Hamdi KAYRAN 1 and Haci ILHAN 2

ROC Analysis of BLM Detector in AF Relays Based Cooperative Wireless Networks Omar GATERA 1, Ahmet Hamdi KAYRAN 1 and Haci ILHAN 2 6 International Conference on Sustainable Energy, Environment an Information Engineering (SEEIE 6) ISBN: 978--6595-337-3 ROC Analys of BLM Detector in AF Relays Base Cooperative Wireless Networks Omar

More information

Cross-layer Routing Optimization for Wireless Networks with Cooperative Diversity

Cross-layer Routing Optimization for Wireless Networks with Cooperative Diversity Cross-layer Routing Optimiation for Wireless Networs with Cooperative Diversity Zhiguo Ding an Kin K. Leung Department of Electrical an Electronic Engineering Imperial College Lonon, UK. Email: {higuo.ing,

More information

Performance Analysis and Comparison of ZF and MRT Based Downlink Massive MIMO Systems

Performance Analysis and Comparison of ZF and MRT Based Downlink Massive MIMO Systems Performance Analysis an Comparison of ZF an MRT Base Downlink Massive MIMO Systems Tebe Parfait, Yujun uang, 1,2 ponyo Jerry 1 Mobilelink Lab Univ of Electronic Sci an Tech of China, UESTC Chengu, China

More information

Wireless Event-driven Networked Predictive Control Over Internet

Wireless Event-driven Networked Predictive Control Over Internet UKACC International Conference on Control 22 Cariff, UK, 3-5 September 22 Wireless Event-riven Networke Preictive Control Over Internet Wenshan Hu, Hong Zhou, an Qijun Deng Abstract In networke control

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 1

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 1 IEEE JORNAL ON SELECTED AREAS IN COMMNICATIONS 1 Full-Duplex Spectrum-Sensing an MAC-Protocol for Multichannel Nontime-Slotte Cognitive Raio Networks Wenchi Cheng, Xi Zhang, Senior Member, IEEE, an Hailin

More information

Energy Efficient Virtual MIMO-based Cooperative Communications for Wireless Sensor Networks

Energy Efficient Virtual MIMO-based Cooperative Communications for Wireless Sensor Networks Energy Efficient Virtual MIMO-base Cooperative Communications for Wireless Sensor Networks Suharman K. Jayaweera Department of Electrical an Computer Engineering Wichita State University, Wichita, KS,

More information

Performance of Amplify-and-Forward Relaying with Wireless Power Transfer over Dissimilar Channels

Performance of Amplify-and-Forward Relaying with Wireless Power Transfer over Dissimilar Channels http://x.oi.org/.5755/ j.eee..5.333 ELEKTRONIKA IR ELEKTROTECHNIKA ISSN 39-5 VOL. NO. 5 5 Performance of Amplify-an-Forwar Relaying with Wireless Power Transfer over Dissimilar Channels Dac-Binh Ha Duc-Dung

More information

Erlang Capacity of Multi-class TDMA Systems with Adaptive Modulation and Coding

Erlang Capacity of Multi-class TDMA Systems with Adaptive Modulation and Coding Downloae from orbittuk on: Oct 2, 218 Erlang Capacity of Multi-class TDMA Systems with Aaptive Moulation an Coing Wang, Hua; Iversen, Villy Bæk Publishe in: Proceeings of IEEE ICC 28 Link to article, DOI:

More information

QoS Topology Control in Ad Hoc Wireless Networks

QoS Topology Control in Ad Hoc Wireless Networks QoS Topology Control in A Hoc Wireless Networks Xiaohua Jia, Deying Li Dept of Computer Science City University of Hong Kong Hong Kong, China Dingzhu Du Dept of Computer Science an Engineering University

More information

MODELLING OF GPS SIGNAL LARGE SCALE PROPAGATION CHARACTERISTICS IN URBAN AREAS FOR PRECISE NAVIGATION

MODELLING OF GPS SIGNAL LARGE SCALE PROPAGATION CHARACTERISTICS IN URBAN AREAS FOR PRECISE NAVIGATION Int. J. Elec&Electr.Eng&Telcomm. 2012 G Sateesh Kumar et al., 2012 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 1, No. 1, October 2012 2012 IJEETC. All Rights Reserve MODELLING OF GPS SIGNAL LARGE

More information

Implementation of Beam Formation for WMNs

Implementation of Beam Formation for WMNs Implementation of Beam Formation for WMNs M. UTHANSAKUL, S. PRADITTARA AND P. UTHANSAKUL School of Telecommunication Engineering Suranaree University of Technology 111 University Avenue, Muang, Nakhonratchasima

More information

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

RECENTLY, the 2G standard GSM was enhanced by

RECENTLY, the 2G standard GSM was enhanced by 274 IEEE TRANSACTIONS ON WIREESS COMMUNICATIONS, VO. 5, NO. 2, FEBRUARY 2006 The Training Sequence Coe Depenence of EDGE Receivers using Zero IF Sampling Martin Krueger, Member, IEEE, Robert Denk, an Bin

More information

AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS

AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS Davi B. Smith (1) (1) Faculty of Engineering (Telecommunications), University of Technology Syney PO Box 13 Broaway NS 007 Australia E-mail:

More information

Voltage/Power Steady State Stability Enhancement of AC-DC for both SIF and MIF System Configurations by Shunt SVC

Voltage/Power Steady State Stability Enhancement of AC-DC for both SIF and MIF System Configurations by Shunt SVC International Journal o Applie Engineering Research ISSN 97-56 Volume, Number 8 (6) pp 97-9 Research Inia Publications. http://www.ripublication.com Voltage/Power Steay State Stability Enhancement o AC-DC

More information

Relay Deployment and Power Control for Lifetime Elongation in Sensor Networks

Relay Deployment and Power Control for Lifetime Elongation in Sensor Networks Relay Deployment an Power Control for Lifetime Elongation in Sensor Networks Yufeng Xin, Tuna Güven, Mark Shayman Institute of Avance Computer Stuies University of Marylan, College Park, MD 074 e-mail:

More information

Secure Communication with a Wireless-Powered Friendly Jammer

Secure Communication with a Wireless-Powered Friendly Jammer Secure Communication with a Wireless-Powere Frienly Jammer Wanchun Liu, Xiangyun Zhou, Salman Durrani, an Petar Popovski arxiv:42.0349v2 [cs.it] 26 Aug 205 Abstract In this paper, we propose to use a wireless-powere

More information

THe notion of the disease [1] has been extended from

THe notion of the disease [1] has been extended from IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 Effective Network Quarantine with Minimal Restrictions on Communication Activities uanyang Zheng an Jie Wu, Fellow, IEEE Abstract

More information

Joint Optimized Energy and Minimum Sensor Deployment Density for Cooperative Spectrum Sensing under Rayleigh Fading Channel

Joint Optimized Energy and Minimum Sensor Deployment Density for Cooperative Spectrum Sensing under Rayleigh Fading Channel Joint Optimize Energy an Minimum Sensor Deployment Density for Cooperative Spectrum Sensing uner Rayleigh Faing Channel Hai Ngoc Pham, Yan Zhang, Tor Skeie, Paal E. Engelsta, Frank Eliassen Department

More information

Aadptive Subcarrier Allocation for Multiple Cognitive Users over Fading Channels

Aadptive Subcarrier Allocation for Multiple Cognitive Users over Fading Channels Proceedings of the nd International Conference On Systems Engineering and Modeling (ICSEM-3) Aadptive Subcarrier Allocation for Multiple Cognitive Users over Fading Channels XU Xiaorong a HUAG Aiping b

More information

Balanced-energy Sleep Scheduling Scheme for High Density Cluster-based Sensor Networks

Balanced-energy Sleep Scheduling Scheme for High Density Cluster-based Sensor Networks Balance-energy Sleep Scheuling Scheme for High Density Cluster-base Sensor Networks Jing Deng, unghsiang S. Han, Weni B. Heinzelman, an Pramo K. Varshney Abstract In orer to conserve battery power in very

More information

Inverse sparse grid flood non-uniformity correction

Inverse sparse grid flood non-uniformity correction Copyright 2005 Society o Photo-Optical Instrumentation Engineers. This paper was publishe in Technologies or Synthetic Environments: Harware-in-the-Loop Testing X an is mae available as an reprint with

More information

Journal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE

Journal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE Journal of Asian Scientific Research ISSN(e): 2223-1331/ISSN(p): 2226-5724 URL: www.aessweb.com DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE

More information

Radio Range Adjustment for Energy Efficient Wireless Sensor Networks. Electronic Engineering, Aston University, Birmingham B4 7ET,United Kingdom b

Radio Range Adjustment for Energy Efficient Wireless Sensor Networks. Electronic Engineering, Aston University, Birmingham B4 7ET,United Kingdom b Raio Range Ajustment for Energy Efficient Wireless Sensor Networks Q. Gao a,, K. J. Blow a 1, D. J. Holing a, I. W. Marshall b, X. H. Peng a a Electronic Engineering, Aston University, Birmingham B4 7ET,Unite

More information

DEFENCE AGAINST INTRUDER IN COGNITIVE RADIO NETWORK OMNET BASED APPROACH. J. Avila, V.Padmapriya, Thenmozhi.K

DEFENCE AGAINST INTRUDER IN COGNITIVE RADIO NETWORK OMNET BASED APPROACH. J. Avila, V.Padmapriya, Thenmozhi.K Volume 119 No. 16 2018, 513-519 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ DEFENCE AGAINST INTRUDER IN COGNITIVE RADIO NETWORK OMNET BASED APPROACH J.

More information

Probabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA

Probabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA Probabilistic Hanshake in All-to-all Broacast Coe Slotte ALOHA Mikhail Ivanov, Petar Popovski, Frerik Brännström, Alexanre Graell i Amat, an Čeomir Stefanović Department of Signals an Systems, Chalmers

More information

Indoor Wireless Planning using Smart Antennas

Indoor Wireless Planning using Smart Antennas Inoor Wireless Planning using Smart Antennas Ali Abbasi an Maji Ghaeri Department of Computer Science, University of Calgary Emails: {abbasi, mghaeri}@ucalgary.ca Abstract This paper consiers the problem

More information

Wireless Powered Dual-Hop Multiple Antenna Relay Transmission in the Presence of Interference

Wireless Powered Dual-Hop Multiple Antenna Relay Transmission in the Presence of Interference EEE CC 05 - Wireless Communications Symposium Wireless Powere Dual-Hop Multiple Antenna Relay Transmission in the Presence of nterference Guangxu Zhu, Caijun Zhong, Himal A. Suraweera, George K. Karagianniis,

More information

PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR

PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR Int. Rev. Appl. Sci. Eng. 8 (2017) 1, 9 16 DOI: 10.1556/1848.2017.8.1.3 PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR M. AL-RAWI University of Ibb,

More information

Shadowing Correlation Model for Indoor Multi-hop Radio Link in Office Environment

Shadowing Correlation Model for Indoor Multi-hop Radio Link in Office Environment JAVA, International Journal of Electrical Electronics Engineering Volume 4, Number, April 26 Shaowing Moel for Inoor Multi-hop Raio Link in Office Environment Mohamma Fahli Inustrial Engineering Department

More information

Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks

Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks Ahmed Alahmadi, Tianlong Song, Tongtong Li Department of Electrical & Computer Engineering Michigan State University,

More information

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003 Introuction to Wireless ommunication Systems EE 476/EE 5/S 53 Winter 3 Review for Exam # April 5, 3 Exam Details Must follow seating chart - Poste 3 minutes before exam. heating will be treate very seriously.

More information

DESIGN AND IMPLEMENTATION OF FULL BRIDGE MODULAR DC-DC CONVERTER FOR SOLAR CONVERSION SYSTEMS

DESIGN AND IMPLEMENTATION OF FULL BRIDGE MODULAR DC-DC CONVERTER FOR SOLAR CONVERSION SYSTEMS VOL. 13, NO. 4, FEBRUARY 18 ISSN 1819-668 ARPN Journal o Engineering an Applie Sciences 6-18 Asian Research Publishing Network (ARPN). All rights reserve. DESIGN AND IMPLEMENTATION OF FULL BRIDGE MODULAR

More information

Power Efficient Pilot Symbol Power Allocation under Time-variant Channels

Power Efficient Pilot Symbol Power Allocation under Time-variant Channels Power Efficient Pilot Symbol Power Allocation uner Time-variant Channels Michal Šimko, Paulo S. R. Diniz,QiWang an Markus Rupp Institute of Telecommunications, Vienna University of Technology, Vienna,

More information

Indoor Positioning Using Ultrasound and Radio Combination

Indoor Positioning Using Ultrasound and Radio Combination Inoor Positioning Using Ultrasoun an Raio Combination Gintautas Salcius, Evalas Povilaitis, Algimantas Tacilauskas Centre of Real Time Computer Systems, Kaunas University of Technology Stuentu St. 50,

More information

Energy Efficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control

Energy Efficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control 11 I Colloquium on Humanities, Science an ngineering Research (CHUSR 11), Dec 5-6 11, Penang nergy fficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control Z.W. Siew, A. Kiring,

More information

RCGA based PID controller with feedforward control for a heat exchanger system

RCGA based PID controller with feedforward control for a heat exchanger system Journal of the Korean Society of Marine Engineering, Vol. 1, No. pp. 11~17, 17 ISSN 223-7925 (Print) J. Korean Soc. of Marine Engineering (JKOSME) ISSN 223-8352 (Online) https://oi.org/.5916/jkosme.17.1..11

More information

On the performance of truncated type III hybrid ARQ scheme with code combining

On the performance of truncated type III hybrid ARQ scheme with code combining WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2003; 3:641 658 (DOI: 10.1002/wcm.147) On the performance of truncate type III hybri ARQ scheme with coe combining Qingchun Chen*,y

More information

Topology-assisted techniques to relay selection for homogeneously distributed wireless sensor networks

Topology-assisted techniques to relay selection for homogeneously distributed wireless sensor networks This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceeings. Topology-assiste techniques to relay selection

More information

Construction of Power Efficient Routing Tree for Ad Hoc Wireless Networks using Directional Antenna

Construction of Power Efficient Routing Tree for Ad Hoc Wireless Networks using Directional Antenna Construction of Power Efficient Routing Tree for A Hoc Wireless Networks using Directional Antenna Qing Dai an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

More information

Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios

Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios Khalid Hossain, Ayman Assra, and Benoît Champagne, Senior Member, IEEE Department o Electrical and Computer Engineering,

More information

Research on the Selection Strategy for Optimal Anchor Nodes Based on Ant Colony Optimization

Research on the Selection Strategy for Optimal Anchor Nodes Based on Ant Colony Optimization Sensors & Transucers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Research on the Selection Strategy for Optimal Anchor Noes Base on Ant Colony Optimization Baoxin ZHAO, Bi ZENG Guangong

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

DETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING

DETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING DETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING Zelko Popovic Distribution engineer Rae Koncara 57, 24300 Backa Topola, Yugoslavia Phone: +38 24 74 220 Fax: +38 24 74 898

More information

The use of Facts devices in disturbed Power Systems-Modeling, Interface, and Case Study

The use of Facts devices in disturbed Power Systems-Modeling, Interface, and Case Study nternational Journal of Computer an Electrical Engineering, ol., No., April 009 793-898 The use of Facts evices in isturbe Power Systems-Moeling, nterface, an Case Stuy Salim. Haa, A. Haouche, an H. ouyea

More information

ASYMMETRIC MODULATION FOR COGNITIVE RADIO AND INTELLIGENT ENVIRONMENTS

ASYMMETRIC MODULATION FOR COGNITIVE RADIO AND INTELLIGENT ENVIRONMENTS ASYMMTRIC MODULATION FOR COGNITIV RADIO AND INTLLIGNT NVIRONMNTS ric. Kreb (SAIC, Chantilly, VA, USA; ekreb@ieee.org); Robert H. Morelos-Zaragoza (San Jose State University, San Jose, CA, USA, r.morelos-zaragoza@ieee.org)

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are IntechOpen, the worl s leaing publisher of Open Access books Built by scientists, for scientists 3,500 108,000 1.7 M Open access books available International authors an eitors Downloas Our authors

More information

/13/$ IEEE

/13/$ IEEE A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract

More information

New M-ary QAM Transmission Payload System

New M-ary QAM Transmission Payload System r AIAA ICSSC-005 New M-ary QAM Transmission Payloa System Masayoshi TANAKA * Nihon University, College of Inustrial Technology, --, Izumicho, Narashino, 75-8575, Japan This paper presents a new M-ary moulation

More information

Determinants of the Bourdon effect

Determinants of the Bourdon effect Perception & Psychophysics 1980,28 (1), 39-44 Determinants of the Bouron effect G. 1. N. ROZVANY an R. H. DAY Monash University, Clayton, Victoria 3168, Australia The Bouron illusion is the apparent inwar

More information

Double Closed-loop Control System Design of PMSM Based on DSP MoupengTao1, a,songjianguo2, b, SongQiang3, c

Double Closed-loop Control System Design of PMSM Based on DSP MoupengTao1, a,songjianguo2, b, SongQiang3, c 4th International Conference on Mechatronics, Materials, Chemistry an Computer Engineering (ICMMCCE 2015) Double Close-loop Control System Design of PMSM Base on DSP MoupengTao1, a,songjianguo2, b, SongQiang3,

More information

Page 1. Overview : Wireless Networks Lecture 7: Cellular Networks. The advent of cellular networks. The cellular network design.

Page 1. Overview : Wireless Networks Lecture 7: Cellular Networks. The advent of cellular networks. The cellular network design. Overview 18-759: Wireless Networks Lecture 7: Cellular Networks Dina Papagiannaki & Peter Steenkiste Departments of Computer Science an Electrical an Computer Engineering Spring Semester 2009 http://www.cs.cmu.eu/~prs/wireless09/

More information

A new quasi-2d analytical threshold-voltage model for partially-depleted. short-channel SOI MOSFET

A new quasi-2d analytical threshold-voltage model for partially-depleted. short-channel SOI MOSFET A new qua-d analtical threshol-voltage moel or partiall-eplete short-channel SO MOSFET KWO-MNG HANG, HAN-PANG WANG Department o Electronics Engineering, National hiao-tung Univert, Hnchu, Taiwan 3, R.

More information

Lousy Processing Increases Energy Efficiency in Massive MIMO Systems

Lousy Processing Increases Energy Efficiency in Massive MIMO Systems 1 Lousy Processing Increases Energy Eiciency in Massive MIMO Systems Sara Gunnarsson, Micaela Bortas, Yanxiang Huang, Cheng-Ming Chen, Liesbet Van der Perre and Ove Edors Department o EIT, Lund University,

More information

Energy Detection Spectrum Sensing Technique in Cognitive Radio over Fading Channels Models

Energy Detection Spectrum Sensing Technique in Cognitive Radio over Fading Channels Models Energy Detection Spectrum Sensing Technique in Cognitive Radio over Fading Channels Models Kandunuri Kalyani, MTech G. Narayanamma Institute of Technology and Science, Hyderabad Y. Rakesh Kumar, Asst.

More information

Uneven Clustering Routing Algorithm Based on Optimal Clustering for Wireless Sensor Networks

Uneven Clustering Routing Algorithm Based on Optimal Clustering for Wireless Sensor Networks Journal of Communications Vol. 11, No., February 016 Uneven Clustering Routing Algorithm Base on Optimal Clustering for Wireless Sensor Networks Jianpo Li an Junyuan Huo School of Information Engineering,

More information

ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation

ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall 2007 Mohamed Essam Khedr Channel Estimation Matlab Assignment # Thursday 4 October 2007 Develop an OFDM system with the

More information

Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization

Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.11, September-2013, Pages:1085-1091 Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization D.TARJAN

More information

A New Speech Enhancement Technique to Reduce Residual Noise Using Perceptual Constrained Spectral Weighted Factors

A New Speech Enhancement Technique to Reduce Residual Noise Using Perceptual Constrained Spectral Weighted Factors IOSR Journal of Electronics an Communication Engineering (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735. Volume 6, Issue 3 (May. - Jun. 013), PP 8-33 A New Speech Enhancement Technique to Reuce Resiual Noise

More information

Abstract Harvesting energy from ambient environment is a new promising solution to free electronic devices from electric

Abstract Harvesting energy from ambient environment is a new promising solution to free electronic devices from electric Wireless Communication System with RF-base Energy Harvesting: From Information Theory to Green System Tao Li, Pingyi Fan, Senior Member, IEEE, Khale Ben Letaief, Fellow, IEEE arxiv:1411.6087v1 [cs.it]

More information

Measurement of Semi-Anechoic Chamber Using Modified VSWR method above 1GHz

Measurement of Semi-Anechoic Chamber Using Modified VSWR method above 1GHz Measurement of Semi-Anechoic Chamber Using Moifie VSWR metho above 1GHz M. Bittera, K. Kováč, J. Hallon Department of Measurement, Faculty of Electrical Engineering an Information Technology, Slovak University

More information

REPORT 2/9_12_2001 Position Error Signal Estimation at High Sampling Rates Using Data and Servo Sector Measurements Abstract

REPORT 2/9_12_2001 Position Error Signal Estimation at High Sampling Rates Using Data and Servo Sector Measurements Abstract REPORT 2/9_12_2001 Position Error Signal Estimation at High Sampling Rates Using Data an Servo Sector Measurements by Petros A. Ioannou an Elias B. Kosmatopoulos Department of Electrical Engineering Systems

More information

Jitter Limitations on a Gigabit Copper Multi- Carrier System

Jitter Limitations on a Gigabit Copper Multi- Carrier System Jitter Limitations on a Gigabit Copper Multi- Carrier System Jan H. Rutger Schraer, Eric A.M. Klumperink, Jan L. Visschers, Bram Nauta University of Twente, IC-Design Group, P.O. Box 7, 75 AE, Enschee,

More information

An Analysis of Reliable MAC Layer Multicast in Wireless Networks

An Analysis of Reliable MAC Layer Multicast in Wireless Networks An Analysis of Reliable MAC Layer Multicast in Wireless etworks Yoooc Song, Junho Chung, Wookyung Sung, Bosung Kim, Dowon Hyun an Juwook Jang Department of lectronic ngineering, Sogang University. mail:

More information

A Cost Analysis of Wireless Mesh Networks

A Cost Analysis of Wireless Mesh Networks 04 th International Symposium on Moeling an Optimization in Mobile, A Hoc, an Wireless Networks (WiOpt) A Cost Analysis of Wireless Mesh Networks Valerio Targon Queen Mary University of Lonon & Alpen-Aria-Universität

More information

Energy Detection Technique in Cognitive Radio System

Energy Detection Technique in Cognitive Radio System International Journal of Engineering & Technology IJET-IJENS Vol:13 No:05 69 Energy Detection Technique in Cognitive Radio System M.H Mohamad Faculty of Electronic and Computer Engineering Universiti Teknikal

More information

Force Control of Flexible Catheter Robots for Beating Heart Surgery

Force Control of Flexible Catheter Robots for Beating Heart Surgery Force Control o Flexible Catheter Robots or Beating Heart Surgery Samuel B. Kesner, Stuent Member, IEEE, an Robert D. Howe, Senior Member, IEEE Abstract Recent evelopments in cariac catheter technology

More information

Principal Component Analysis-Based Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing

Principal Component Analysis-Based Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing Principal Component Analysis-Base Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing Xin He 1, Yashwant Malaiya 2, Anura P. Jayasumana 1 Kenneth P. Parker 3 an Stephen Hir

More information

Overhead Energy Considerations for Efficient Routing in Wireless Sensor Networks

Overhead Energy Considerations for Efficient Routing in Wireless Sensor Networks Overhea nergy Consierations for fficient Routing in Wireless Sensor Networks. Ilker Oyman an Cem rsoy Computer ngineering Department, Bogazici University, Istanbul, Turkey {oymani, ersoy}@boun.eu.tr Abstract

More information

Professor of Computer Engineering, Shobra Faculty of Engineering, Benha University, Cairo,Egypt, Cairo,Egypt

Professor of Computer Engineering, Shobra Faculty of Engineering, Benha University, Cairo,Egypt, Cairo,Egypt Visible Light Communication (VLC) Channel Moeling [1] M.Mohanna, [2] Raafat A.EL-Kammar, [3] M.LotfyRabeh, [4] Mohame I.Gabr [1] Professor, National Research Institute an Geophysics, Cairo, Egypt [2] Professor

More information

Wave-Induced Fluctuations in Underwater Light Field: Analysis of Data from RaDyO Experiments

Wave-Induced Fluctuations in Underwater Light Field: Analysis of Data from RaDyO Experiments DISTRIBUTION STATEMENT A. Approve for public release; istribution is unlimite. Wave-Inuce Fluctuations in Unerwater Light Fiel: Analysis of Data from RaDyO Experiments Dariusz Stramski Marine Physical

More information

Improvement of Power Factor and Harmonic Reduction with VSC for HVDC System

Improvement of Power Factor and Harmonic Reduction with VSC for HVDC System International Journal of Engineering an Management Research, Volume-3, Issue-2, April 2013 ISSN No.: 2250-0758 Pages: 6-12 www.ijemr.net Improvement of Power Factor an Harmonic Reuction with VSC for HVDC

More information

A NEW SPEECH ENHANCEMENT TECHNIQUE USING PERCEPTUAL CONSTRAINED SPECTRAL WEIGHTING FACTORS

A NEW SPEECH ENHANCEMENT TECHNIQUE USING PERCEPTUAL CONSTRAINED SPECTRAL WEIGHTING FACTORS A NEW SPEECH ENHANCEMENT TECHNIQUE USING PERCEPTUAL CONSTRAINED SPECTRAL WEIGHTING FACTORS T. Muni Kumar, M.B.Rama Murthy, Ch.V.Rama Rao, K.Srinivasa Rao Gulavalleru Engineering College, Gulavalleru-51356,

More information

EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT

EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT Timothy W. McLain Ranal W. Bear Je M. Kelsey Department of Mechanical Engineering, Brigham Young University, Provo, Utah 86 Department

More information

Mobile radio propagation path loss simulation for two districts of different buildings structures in Mosul-city

Mobile radio propagation path loss simulation for two districts of different buildings structures in Mosul-city Vol.7 No.1, 211 مجلد 7, العدد 1, 211 gy, y,, q Moile raio propagation pat loss simulation or two istricts o ierent uilings structures in Mosul-city Fara E. Mamoo Electrical Dept. college Eng. IEEE. Memer

More information

Breaking the Interference Barrier in Dense Wireless Networks with Interference Alignment

Breaking the Interference Barrier in Dense Wireless Networks with Interference Alignment Breaking the Interference Barrier in Dense Wireless Networks with Interference Alignment Konstantinos Dovelos an Boris Bellalta Universitat Pompeu Fabra (UPF, Barcelona Abstract arxiv:1710.11458v2 [cs.ni]

More information

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ITERATIOAL JOURAL OF ELECTROICS AD COMMUICATIO EGIEERIG & TECHOLOGY (IJECET) ISS 976 6464(Print) ISS 976 6472(Online) Volume 3, Issue 3, October- December (22), pp. 49-59 IAEME: www.iaeme.com/ijecet.asp

More information

Cognitive Ultra Wideband Radio

Cognitive Ultra Wideband Radio Cognitive Ultra Wideband Radio Soodeh Amiri M.S student of the communication engineering The Electrical & Computer Department of Isfahan University of Technology, IUT E-Mail : s.amiridoomari@ec.iut.ac.ir

More information