Max-ratio relay selection in secure buffer-aided cooperative wireless networks
|
|
- Lester Marsh
- 5 years ago
- Views:
Transcription
1 Loughborough University Institutiona Repository Max-ratio reay seection in secure buffer-aided cooperative wireess networks This item was submitted to Loughborough University's Institutiona Repository by the/an author. Citation: CHEN, G.... et a., 214. Max-ratio reay seection in secure bufferaided cooperative wireess networks. IEEE Transactions on Information Forensics and Security, 9 (4), pp Additiona Information: This is an Open Access Artice. It is pubished by the IEEE under the Creative Commons Attribution 3. Unported Licence (CC BY). Fu detais of this icence are avaiabe at: Research data for this paper is avaiabe on request from the authors. Metadata Record: Version: Pubished Pubisher: c the authors. Pubished by IEEE Pease cite the pubished version.
2 This item is distributed via Loughborough University s Institutiona Repository ( and is made avaiabe under the foowing Creative Commons Licence conditions. For the fu text of this icence, pease go to:
3 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL Max-Ratio Reay Seection in Secure Buffer-Aided Cooperative Wireess Networks Gaojie Chen, Member, IEEE, Zhao Tian, Student Member, IEEE, Yu Gong, Member, IEEE, Zhi Chen, Member, IEEE, and Jonathon A. Chambers, Feow, IEEE Abstract This paper considers the security of transmission in buffer-aided decode-and-forward cooperative wireess networks. An eavesdropper which can intercept the data transmission from both the source and reay nodes is considered to threaten the security of transmission. Finite size data buffers are assumed to be avaiabe at every reay in order to avoid having to seect concurrenty the best source-to-reay and reay-to-destination inks. A new max-ratio reay seection poicy is proposed to optimize the secrecy transmission by considering a the possibe source-to-reay and reay-to-destination inks and seecting the reay having the ink which maximizes the signa to eavesdropper channe gain ratio. Two cases are considered in terms of knowedge of the eavesdropper channe strengths: exact and average gains, respectivey. Cosed-form expressions for the secrecy outage probabiity for both cases are obtained, which are verified by simuations. The proposed max-ratio reay seection scheme is shown to outperform one based on a max-min-ratio reay scheme. Index Terms Secure wireess communications, cooperative networks, reay seection, secrecy capacity. I. INTRODUCTION TRADITIONALLY security in wireess networks has been focused on higher ayers using cryptographic methods [1]. However, retaining security at high ayers is becoming more chaenging due to the increased potentia for attack, therefore, there has been growing interest in impementing security at the physica ayer. Reated work was described as eary as in the 197s [2] [5], and more recenty for physica ayer security in wireess communications [6] [1]. The purpose of physica ayer security is to prevent eavesdroppers from intercepting the data transmitted between the source and intended destination. The secrecy is quantified by the secrecy capacity, or the maximum rate of reiabe information sent Manuscript received September 2, 213; revised December 24, 213 and February 18, 214; accepted February 18, 214. Date of pubication February 21, 214; date of current version March 14, 214. This work was supported in part by the Engineering and Physica Sciences Research Counci under Grant EP/K1437/1 and in part by the MOD University Defence Research Coaboration in Signa Processing. The associate editor coordinating the review of this manuscript and approving it for pubication was Prof. T. Chares Cancy. G. Chen, Z. Tian, Y. Gong, and J. A. Chambers are with the Advanced Signa Processing Group, Schoo of Eectronic, Eectrica and Systems Engineering, Loughborough University, Loughborough LE11 3TU, U.K. (e-mai: g.chen@boro.ac.uk; z.tian@boro.ac.uk; y.gong@boro.ac.uk; j.a.chambers@boro.ac.uk). Z. Chen is with the Nationa Key Laboratory of Science and Technoogy on Communications, University of Eectronic Science and Technoogy of China, Chengdu , China (e-mai: chenzhi@uestc.edu.cn). Coor versions of one or more of the figures in this paper are avaiabe onine at Digita Object Identifier 1.119/TIFS from the source to the intended destination in the presence of eavesdroppers [5]. Recent research shows that cooperative communication not ony significanty improves the transmission capacity for wireess networks (e.g. [11] and [12]), but aso provides an effective way to improve the secrecy capacity. This is achieved by carefuy designing the reays to maximize the information rate at the intended destination and minimize that at the eavesdroppers [13]. In genera, there are three ways to improve the secrecy capacity in a cooperative network: Distributed beamforming - The secrecy capacity can be maximized by optimizing the transmission weights (or the beamforming weights) at the reay and source nodes (e.g. [14] and [15]). Such distributed beamforming however requires high coordination (such as synchronization and centra optimization) among source and reay nodes, which usuay requires high overhead in impementation, i.e. a arge amount of information needs to be exchanged between the reay nodes. Jamming - A jammer is used to inject artificia interference into the system. When the injected interfering power is higher at the eavesdroppers than that at the intended destination, the secrecy capacity can be improved (e.g. [16] [18]). This often requires the jammer to be ocated coser to the eavesdroppers than to the destination node, which is not aways possibe in practice. Reay seection - Reay seection can increase the secrecy capacity by choosing an appropriate reay node with strong transmission ink to the intended destination node and weak ink to the eavesdropper [19] [22]. The reay seection provides an attractive way to improve the secrecy capacity with itte overhead in impementation. The performance of the reay seection depends strongy on the number of avaiabe inks for seection, which again depends on not ony the number of reays but aso the reay seection scheme. When the number of avaiabe inks is imited, so is the secrecy performance. Thus it is important to investigate reay seection schemes to have the best secrecy performance for a given number of reays, which is the main objective of this paper. In traditiona reay seection to improve wireess communications, the best reay is seected with the strongest ink connecting the source and destination (e.g. [23] and [24]). It is shown in [19] that by using reay seection the secrecy capacity can aso be improved when the best reay is seected This work is icensed under a Creative Commons Attribution 3. License. For more information, see
4 72 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 214 to maximize the signa to eavesdropper channe gain ratio, which is abbreviated as the gain ratio in this paper. The reay seection scheme in [19] is based on the scenario that the eavesdropper can ony intercept the signas from the reays but not the source node. On the other hand, if the eavesdropper intercepts signas from both the reay and source nodes, the best reay is seected as having the maximum secrecy capacity among every pair of source-to-reay and reay-to-destination inks [18], which is termed as the max-min-ratio scheme in this paper. Aternativey, it is aso possibe to seect a jammer from the avaiabe reays (e.g [2]), but this is at the price of injecting more inference not ony to the intended receivers but aso to other users in the system. As was shown in [2], incuding a jammer does not necessariy ead to improvement in secrecy capacity, and thus a switching scheme was described to activate/deactivate the jammer. Recent research shows that, by introducing data buffers at the reays, it is possibe to reax the constraint that the best source-to-reay and reay-to-destination inks for a packet transmission must be determined concurrenty, and achieve significant performance advantage [25] [3]. A typica bufferaided reay seection is the max-max scheme described in [27], where the strongest source-to-reay and reay-to-destination inks are seected aternativey so that it has significant coding gain over the traditiona max-min scheme. Because the maxmax reay seection sti foows the traditiona transmission order, that is the source-to-reay and reay-to-destination transmissions aways carry on in an aternative manner, it can ony attain a diversity order of N which is the same as that for the max-min scheme, where N is the number of avaiabe reay nodes. In the recent max-ink approach [25], this constraint on the transmission order is further reaxed so that, at any time, a best ink is seected among a avaiabe source-to-reay and reay-to-destination inks. Depending on whether a source-toreay or a reay-to-destination ink is seected, either the source transmits a packet to the seected reay or the seected reay forwards a stored packet to the destination. It is shown in [25] that the max-ink reay seection not ony has coding gain over the max-min scheme, but aso has higher diversity order than both the max-min and max-max schemes. In particuar, the diversity order can approach 2N when the reay buffer size is arge enough. Inspired by the max-ink scheme, in this paper, we propose a nove max-ratio reay seection scheme for secure transmission in decode-and-forward (DF) reay networks with an eavesdropper which can intercept signas from both the source and reay nodes. In the proposed max-ratio scheme, every reay is equipped with a data buffer, and the best ink is aways seected with the highest gain ratio among a avaiabe sourceto-reay and reay-to-destination inks. We consider two cases for which either the exact, or the average gain, for the eavesdropping channe is avaiabe; the atter case is of particuar interest in practice since it is not aways possibe to obtain the exact channe information describing the eavesdropping channes. Both theoretica and simuation resuts show that the proposed max-ratio reay seection has significanty better performance than the conventiona max-min-ratio scheme, confirming that it represents an attractive approach for secure wireess transmission. The main contributions of this paper are summarized as foows to: Propose the buffer-aided max-ratio reay seection poicy for secure communications in a DF cooperative network. This is the first approach in using buffer-aided reay seection in secure transmission under the scenario that the eavesdropper can intercept signas from both the source and reay nodes. Existing reay seection schemes for secure transmission mainy assume no source-toeavesdropper ink for simpicity (e.g. [19]). Whie in [22] both the source and reay to eavesdropper inks are considered, the proposed scheme is for the two-way reay network and furthermore no cosed form expression is obtained for the secrecy outage probabiity. Derive cosed-form expressions for the secrecy outage probabiity of the max-ratio scheme for both cases when either the exact, or average, gains of the eavesdropping channes are avaiabe. Because the gain-ratios for the source-to-reay and reay-to-destination transmissions have different statistica distributions, the secrecy outage performance of the proposed max-ratio scheme is much more invoved to anayze than existing approaches such as the reay seection scheme for secure transmission in [19] and the buffer-aided max-ink scheme for wireess communications in [25]. In this paper, the probem arising from such unbaanced distribution has been successfuy soved, and the anaysis aso provides a usefu way in anayzing simiar systems such as a typica reay seection scheme but without the usua assumption that the source-to-reay and reay-to-destination channes are independent and identicay distributed (i.i.d.). The remainder of the paper is organized as foows: Section II describes the system mode; Section III proposes the max-ratio reay seection scheme; Sections IV and V anayze the secrecy outage probabiity for the cases with exact and average knowedge of the eavesdropping channes, respectivey; Section VI discusses the performance of the max-ratio scheme when the reay buffer sizes go to infinity; Section VII gives numerica simuations to verify the proposed max-ratio scheme; finay, Section VIII summarizes the paper. II. SYSTEM MODEL The system mode of the reay network with an eavesdropper is shown in Fig. 1, where there is one source node (S), one destination node (D), a set of K reays {R 1, R 2,...,R K }, and one eavesdropper (E) which can intercept signas from both the source and reay nodes. The reay nodes appy the DF protoco and perform the haf-dupex mode so that they do not transmit and receive simutaneousy. In our mode, we assume no direct ink between the source and the destination due to path oss or shadowing effects. 1 The channe coefficients for S R k, S E, R k D and R k E at time t are denoted as h srk (t), h se (t), h rk d(t) and h rk e(t) respectivey, where simiar subscripts are aso used for other parameters to indicate different channes in 1 Incuding the direct ink has itte effect on the reay seection which is the main issue in this paper.
5 CHEN et a.: MAX-RATIO RELAY SELECTION IN SECURE BUFFER-AIDED COOPERATIVE WIRELESS NETWORKS 721 Fig. 1. Reay seection system mode in secure transmission, where the eavesdropper intercepts signas from both the source and reay nodes. this paper. We assume the channes are quasi-static Rayeigh fading so that the channe coefficients remain unchanged during one packet duration but independenty vary from one packet time to another. We aso assume that a source-toreay inks are independent and identicay distributed (i.i.d.) fading and that E h srk (t) 2 γ sr for a k; a reay-todestination channe gains are aso i.i.d. and E h rk d(t) 2 γ rd, as are a reay-to-eavesdropper channe gains for which E h rk e(t) 2 γ re. The source-to-eavesdropper channe gain is denoted as E h se (t) 2 γ se. It is noted that we do not require any two of γ sr, γ rd, γ se and γ re to be the same, thereby representing a practica scenario. A noises are additive white Gaussian noise (AWGN), and without osing generaity the noise variances are a normaized to unity. The transmission powers for source and reay nodes are a assumed to be E s. With the DF appied at the reays, if the reay R k is seected for the data transmission, the instantaneous secrecy capacity for the overa system is obtained as [31] C k (t)max { 1 2 og 2 min{1+ E s h srk (t) 2, 1+ E s h rk d(t) 2 } 1+ E s h se (t) 2 + E s h rk e(t) 2 If the exact knowedge of the eavesdropping channes are avaiabe, the best reay node can be seected with the maximum C k (t). On the other hand, if ony the average gains of the eavesdropping channes are known, the best reay maximizes C k (t) with h se (t) 2 and h rk e(t) 2 being repaced with the average gains γ se and γ re in (1) respectivey. This scheme is termed as the max-min-ratio reay seection in this paper. For convenience in deveopment, the time index t is ignored in the rest of the paper uness necessary. III. MAX-RATIO RELAY SELECTION The performance of the max-min-ratio scheme is imited by the constraint that the best source-to-reay and reay-todestination inks must be determined concurrenty. In this paper, we propose a new max-ratio seection scheme by making use of data buffers at the reays. To be specific, we assume that every reay is equipped with a data buffer Q k (1 k K ) of finite size L (in the number of data packets), and the data packets in the buffer foow the first-in-first-out rue. } (1) At any time, the best transmission ink with the highest gain-ratio is seected among a avaiabe source-to-reay and reay-to-destination inks. Depending on the knowedge of the eavesdropper channe, we have two seection criteria: Case 1 - If the exact knowedge of a channes, 2 incuding the eavesdropping channes h se and h rk e, are avaiabe, the max-ratio seects the best reay as R (max ratio) case 1 arg max R k max { h sr k 2 } R k : (Q k ) L h se 2, max R k : (Q k ) { hrk d 2 h rk e 2 }, where (Q k ) gives the number of data packets in buffer Q k. Case 2 - If ony the average channe gains for the eavesdropping channes, i.e. γ se and γ re, are avaiabe (but the exact knowedge for a other channes is known), the best reay for the max-ratio scheme is seected as: R (max ratio) case 2 arg max R k max { h sr k 2 } R k : (Q k ) L, γ se (2) max { h r k d 2 } R k : (Q k ). (3) A. Secrecy Outage Probabiity The secrecy outage probabiity is defined as P out P(C < r sc ), where C is the instantaneous secrecy capacity, r sc is the target secrecy capacity and P(.) gives the probabiity of the encosed. In the max-ratio reay seection scheme, at any time, the numbers of data packets in every buffer form a state. Because there are K avaiabe reays and every reay is equipped with a buffer of size L, thereare(l + 1) K states in tota. The -th state vector is defined as s [ (Q 1 ),..., (Q K )] T, 1,...,(L + 1) K, (4) where (Q k ) gives the number of data packets in buffer Q k at state s. It is cear that (Q k ) L. Everystate corresponds to one pair of (K 1, K 2 ),wherek 1 and K 2 are the numbers of avaiabe inks for source-to-reay and reayto-destination transmission, respectivey. A source-to-reay or a reay-to-destination ink is considered avaiabe when the buffer of the corresponding reay node is not fu or not empty respectivey. It is cear that K 1 K and K 2 K. Specificay, if none of the buffers is fu or empty, a inks are avaiabe such that K 1 K 2 K. At state s, the best ink is seected among a K 1 source-toreay and K 2 reay-to-destination inks. We denote p s out as the outage probabiity for state s. Considering a possibe states, we obtain the secrecy outage probabiity for the max-ratio reay seection as P out (L+1) K 1 γ re π p s out, (5) 2 The CSI is usuay estimated through piots and feedback (e.g. [32]), and the CSI estimation without feedback may aso be appied (e.g [33]). Further detai of the CSI estimation is beyond the scope of this paper.
6 722 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 214 where π p(s ) which is the stationary probabiity for state s. B. State Transition Matrix Suppose at time t, the state for the reay buffers is s. At time (t + 1), there is one reay seected for either receiving or transmitting a data packet, so that the number of packets in the corresponding buffer is increased or decreased by one respectivey. Depending on which reay receives or transmits data, at time (t + 1), the buffers may move from state s to severa possibe states, forming a Markov chain. We denote A as the (L + 1) K (L + 1) K state transition matrix, where the entry A n, P(X t+1 s n X t s ) is the transition probabiity that the state moves from s at time t to s n at time (t + 1). If the secrecy outage event occurs, the state s remain unchanged at time (t + 1). Otherwise, s moves to another state. Thus the probabiity for s to eave for another state is given by p eave s 1 p s out. (6) It is cear from the seection rues (2) and (3) that, for both Cases 1 and 2, the probabiities to seect the source-to-reay and reay-to-destination transmission at any time are not the same. This is very different from the max-ink approach in [25] where the seection of any avaiabe ink is equay ikey. We divide a states which can be moved from s into two sets, U + and U,whereU + contains a states to which s can move when a source-to-reay ink is seected and U contains a states to which s can move when a reay-to-destination ink is seected. We et ps S D and ps R D be the probabiities that the source-to-reay and reay-to-destination transmissions are seected at state s, respectivey. It is cear that ps S D + ps R D 1. On the other hand, because we assume a source-to-reay channes are i.i.d. fading and a reay-to-destination channes are aso i.i.d. frequency fat fading and so are the reay-toeavesdropper channes, the seection of one particuar ink within either U + or U is equay ikey. Therefore, the probabiity to seect a source-to-reay or reay-to-destination ink at state s is given by ( ) 1 p s + ps eave ps S R K 1 (1 p s 1 K out)(1 ps R D ), ( ) 1 1 ps eave ps R D K 1 (1 p s 2 K out)ps R D, (7) 2 p s respectivey. With these observations, the (n, )-th entry of the state transition matrix A is expressed as p s p s out, if n, p s + A n, K 1 1 (1 p s out)(1 ps R D ), if s n U +, ps K 1 2 (1 p s out)ps R D, if s n U,, esewhere. (8) Because the transition matrix A in (8) is coumn stochastic, irreducibe and aperiodic, 3 the stationary state probabiity vector is obtained as (see [35] and [36]) π (A I + B) 1 b, (9) where π [π 1,,π (L+1) K ] T, b (1, 1,...,1) T, I is the identity matrix and B n, is an n a one matrix. Finay, substituting (8) and (9) into (5) re-formats the secrecy outage probabiity as P out (L+1) K 1 π p s out diag(a) π diag(a) (A I + B) 1 b, (1) where diag(a) is a vector consisting of a diagona eements of A. It is cear from (1) that the secrecy outage probabiity P out is determined by A which again, from (8), is determined by p s out and ps R D. The secrecy outage probabiities for both Cases 1 and 2 can be expressed as (1), but with different p s out and ps R D which are derived beow. IV. CASE 1-EXACT KNOWLEDGE OF EAVESDROPPING CHANNELS In Case 1, we assume exact knowedge for the instantaneous gains for a channes, incuding the eavesdropping channes. This is a typica assumption in many existing approaches (e.g. [2] and [21]). A. p s out: Outage Probabiity at State s for Case 1 The reay seection rue for Case 1 is shown in (2). For better exposition, we et x max { h sr k 2 }/ h se 2, y (Q k ) L max { h r k d 2 / h rk e 2 } and z max(x, y). In order to concentrate on the secrecy capacity, we assume the channe SNR (Q k ) is high enough so that the decoding is aways successfuy at the reay and destination nodes. 4 The probabiity of outage event at state s at the high SNR is given by p s out P(z < 2 2r sc ) F Z (z) z2 2rsc, (11) where F Z (z) is the cumuative-probabiity-function (CDF) of z which is derived beow. Reca that state s corresponds to (K 1, K 2 ). From the theory of order statistics [37], if the number of avaiabe source-toreay inks is K 1,theCDFofx 1 max { h sr k 2 } is given (Q k ) L by F X1 (x) [1 e γsr x ] K 1, (12) Noting that x x 1 / h se 2,theCDFofx is then obtained as K 1 F X (x) CK i 1 ( 1) i M 1, (13) ix + M 1 i 3 Coumn stochastic means a entries in any coumn sum up to one, irreducibe means that it is possibe to move from any state to any state, and aperiodic means that it is possibe to return to the same state at any steps [34], [35]. 4 This is a typica assumption in most existing secure communications iterature (e.g. [19], [2]).
7 CHEN et a.: MAX-RATIO RELAY SELECTION IN SECURE BUFFER-AIDED COOPERATIVE WIRELESS NETWORKS 723 where CK i 1 K 1!/[i!(K 1 i)!] which is the binomia coefficient, and M 1 γ sr /γ se which is the average gain ratio between the source-to-reay and source-to-eavesdropper channes. On the other hand, because the number of avaiabe reayto-destination inks is K 2,theCDFofy is given by [ ] y K2 F Y (y), (14) M 2 + y where M 2 γ rd /γ re which is the average gain ratio between the reay-to-destination and reay-to-eavesdropper channes. Because x and y are mutuay independent, from (13) and (14), the CDF of z max(x, y) is obtained as: K 1 [ ] F Z (z) F X (z)f Y (z) CK i 1 ( 1) i M 1 z K2. iz+m 1 M 2 +z i (15) Substituting (15) into (11) gives p s K 1 [ out CK i 1 ( 1) i M 1 2 2r ] K2 sc i2 2r sc + M 1 M r. (16) sc i The next subsection wi provide the probabiity of seecting the reay to destination transmission at state s. B. ps R D : Probabiity of Seecting the Reay-to-Destination Transmission at State s for Case 1 If there are no reay-to-destination inks avaiabe (or K 2 ), we have ps R D. On the other hand, if there are no source-to-reay inks avaiabe (or K 1 ), we have ps R D 1. For other cases, ps R D is obtained in Appendix I. In summary, we have obtained ps R D (17), as shown at the bottom of the page, where B(x, y) 1 t x 1 (1 t) y 1 dt which is the Beta function and F 2,1 (a, b, c, z) is the first hypergeometric function. Finay, substituting (16) and (17) into (1) gives the secrecy outage probabiity at the high SNR for Case 1. V. CASE 2-KNOWLEDGE OF THE AVERAGE CHANNEL GAINS FOR EAVESDROPPING CHANNELS In case 2, we ony have knowedge of the average gains for eavesdropping channes, whie the exact information for a other channes are sti avaiabe. A. p s out: Outage Probabiity at State s for Case 2 We et u ab h ab 2 /γ ab be the normaized gain for channe h ab, where {ab} {sr k, se, r k d, r k e}. Because of the normaization, a u ab have the same probabiity-densitydistribution (PDF) as f U (u) e u, (18) The seection rue in (3) can then be expressed as R (2) b arg max R k { max R k : (Q k ) L { } { } } M1 u srk, max M2 u rk d, R k : (Q k ) (19) where M 1 and M 2 are defined in (13) and { (14), respectivey. } We further et f max M1 u srk, g { } R k : (Q k ) L max M2 u rk d and w max{ f, g}. It is cear that w is R k : (Q k ) directy obtained from the seection rue (3) which is based on the average gain of the eavesdropping channes. On the other hand, the secrecy outage is determined by the instantaneous gains of the data and eavesdropping channes. Therefore, in order to obtain the outage probabiity, w needs to be divided by u which is normaized exponentiay distributed with PDF given by (18). Or the outage probabiity for state s for Case 2 is given by p s out P(v < 2 2r sc ) F V (v) v2 2rsc, (2) where v w/u. The CDF-s of f and g are given by F F ( f ) [ 1 e 1] f/m K1 [ and F G (g) 1 e 2] g/m K2, (21) respectivey. Because f and g are mutuay independent, the CDF of w max{ f, g} is obtained as [ ] F W (w) F F (w)f G (w) 1 e w/m K1 [ K e 2] w/m (22) Then the CDF of v w/u is [ ] F V (v) 1 e uv/m K1 [ 1 1 e 2] uv/m K2 e u du K 1 K 2 i j C i K 1 C i K 2 ( 1) i+ j M 1 M 2 v(m 2 i + M 1 j) + M 1 M 2. (23), K 2, < K 1 K, 1 K 1 /2+ K 1 i 2 Ci K 1 ( 1) i i[n(i) 1]+1 (i 1) 2, < K 1 K, K 2 1, M 1 M 2 ps R D 1+ K 1 i 1 Ci K 1 ( 1) i M 2 in(i)+in(m 2 )M 2 in(m 1 )M 2 M 2 i +M 1 M 1 (M 1 im 2 ) 2, < K 1 K, K 2 1, M 1 M 2 1+ K 1 i 1 Ci K 1 ( 1) i K 2 ( M 1 M 2 i )K 2 B(2, K 2 )F 2,1 ([K 2 +1, K 2 ], K 2 +2, 1 M 1 M 2 i ), < K 1 K, 1 < K 2 K, 1, K 1, < K 2 K, (17)
8 724 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 214 Substituting (23) into (11) gives K 1 K 2 p s out i j C i K 1 C i K 2 ( 1) i+ j M 1 M 2 2 2r sc(m 2 i + M 1 j) + M 1 M 2. (24) The next subsection wi provide the probabiity of seecting the reay to destination transmission at state s. B. ps R D : Probabiity of Seecting the Reay-to-Destination Transmission at State s for Case 2 SimiartothatinCase1,wehaveps R D fork 2, and ps R D 1forK 1. But otherwise, we have ps R D P( f < g) f FG ( f, g)dfdg, (25) f <g where f FG ( f, g) is the joint PDF of f and g. From (21), the PDFs of f and g are obtained as f F ( f ) K 1 e f M 1 (1 e f M 1 ) K 1 1 M 1 f G (g) K 2 e g M 2 (1 e g M 2 ) K2 1, (26) M 2 respectivey. Because f and g are mutuay independent, we have f FG ( f, g) f F ( f ) f G (g). Substituting (26) into (25) gives (27), as shown at the bottom of the page. Therefore, we have ps R D in (28), as shown at the bottom of the page. Finay, substituting (24) and (28), into (1) gives the secrecy outage probabiity at high SNR for Case 2. VI. DISCUSSION In this section, we consider a specific scenario that the average gain ratios for the source-to-reay and reay-to-destination transmissions are the same, or M 1 M 2. Of particuar interest is the outage performance for L which shows the best potentia performance for the max-ratio scheme. First we consider Case 2. Because M 1 M 2, the probabiities to seect a source-to-reay and reay-to-destination ink are the same, and both equa 1/(K 1 + K 2 ). This is simiar to the max-ink scheme in [25]. Thus buiding upon the anaysis in [25], we can obtain that, if L, the stationary probabiity for any state corresponding to K 1 K or K 2 K must be, or we have P(s ) 1. (29) s :K 1 K 2 K This impies that, if L, at any time, the best ink is aways seected from K 1 + K 2 2K avaiabe channes with the max-ratio scheme in Case 2. In Case 1, unfortunatey, we cannot have a simpe form as in (29) for L, because the probabiities to seect a source-to-reay and reay-to-destination ink are not equa, even with M 1 M 2. In order to iustrate the performance for L, the origina scheme can be assumed to be equivaent to a virtua reay section scheme having equa probabiity to seect a source-to-reay and reay-to-destination ink, or P(x < y).5 wherex and y are defined in Section IV-A. Then in the virtua scheme with L, the number of avaiabe source-to-reay and reay-to-destination inks are aways K 1 and K 2, respectivey, or s :K 1 K 1,K 2K 2 P(s ) 1. If we et K 1 K,thenK 2 can be obtained by soving P(x < y).5 as (3), as shown at the bottom of the page, where P(x < y) is given by (35) in the Appendix I. Since K 2 obtained from (3) is usuay not an integer, the virtua seection scheme cannot be reaized in practice. However, it provides interesting insight in understanding the secrecy performance of the origina max-ratio scheme in Case 1 for L. Normay, we have K 2 < K,which impies that, on the average, the best ink is aways seected from K 1 + K 2 avaiabe channes at any time and K K 1 + K 2 2K. For both Case 1 and 2, with a imited buffer size L, we aways have K 1 + K 2 K at any time. On the contrary, in the max-min-ratio seection scheme, the best ink is seected from ony K inks. Therefore, it foows that the max-ratio scheme has significanty better secrecy outage performance than the benchmark max-min-ratio scheme, and the best potentia performance for the max-ratio scheme is reached when L. This wi be verified the next section. VII. NUMERICAL RESULTS In this section, simuation resuts are given to verify the secrecy outage probabiities for the proposed max-ratio reay seection scheme. Both Case 1 and 2 are considered. In the s s y K 1 K 2 M 1 M 2 e x M1 e y M 2 (1 e x M 1 ) K 1 1 (1 e y K 1 M 2 ) K2 1 dxdy i K 2 1, K 2, < K 1 K, K1 K2 1 i j Ci K 1 C j K 2 1 ( 1)i+ j M 1 K 2 M 1 + M 1 j + M 2 i, < K 1 K, < K 2 K, 1, K 1, < K 2 K. j C i K 1 C j K 2 1 ( 1)i+ j M 1 K 2 M 1 +M 1 j +M 2 i. (27) (28) K 1 P(x < y) C i K 1 ( 1) i+1 K 2 ( M 1 M 2 i )K 2B(2, K 2 )F 2,1([K 2 + 1, K 2 ], K 2 + 2, 1 M 1 ).5, (3) M 2 i i1
9 CHEN et a.: MAX-RATIO RELAY SELECTION IN SECURE BUFFER-AIDED COOPERATIVE WIRELESS NETWORKS 725 Fig. 2. The secrecy outage probabiities for different reay seection schemes. (a) Case 1. (b) Case 2. Fig. 4. The secrecy outage probabiities of the max-ratio scheme for different reay numbers K. (a) Case 1. (b) Case 2. Fig. 3. The secrecy outage probabiities of the max-ratio scheme for Cases 1 and 2. simuation, a noise variance and transmission powers are normaized to unity, and the average channe gains for sourceto-reay and reay-to-destination transmissions are set as γ sr γ rd 3 db. Thus the corresponding average channe SNR is aso 3 db which is high enough to guarantee successfu decoding at the reays and destination. The average eavesdropping channe gains, i.e. γ se and γ re, are determined through the settings of the average gain ratios M 1 γ sr /γ se and M 2 γ rd /γ re,whereweetm 1 M 2 for various vaues in the simuations. In every simuation beow, both theoretica and simuated secrecy outage probabiities are shown to essentiay perfecty match, where the theoretica resuts are based on (1) and simuation resuts are obtained by averaging 5,, independent runs. This verifies the cosed-form secrecy outage probabiities obtained in this paper. Fig. 2 compares the secrecy outage performance of the proposed max-ratio scheme with those for the no reay seection and the traditiona max-min-ratio schemes, where the reay number is set as K 5 in a reay seection schemes. It is ceary shown that the no reay seection scheme has the worst outage performance and the proposed max-ratio has the best. It is interesting to observe that, for both Cases 1 and 2, with buffer size L 1, the max-ratio sti performs significanty better than the max-min-ratio scheme. We highight that the max-min-ratio scheme is effectivey aso equipped with a buffer of size 1, because the reays need to store the decoded data at one time and transmit out at the next time. However, even with L 1, the max-ratio does not reduce to the maxmin-ratio scheme. This is because, for any reay receiving a data packet in the max-ratio scheme, it has the choice of whether to transmit the packet out at the next time or not.
10 726 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 214 Fig. 5. The secrecy outage probabiities of the max-ratio scheme for different reay buffer sizes L. (a) Case 1. (b) Case 2. Fig. 6. The secrecy outage probabiities vs SNR, where γ se γ re 3 db and target secrecy capacity is unity. (a) Case 1. (b) Case 2. On the contrary, the reays in the max-min-ratio schemes do not have such choices. Therefore, the max-ratio scheme has coding gain over the max-min-ratio approach. On the other hand, with L, the best potentia performance of the max-ratio is reached, which is ceary shown in Fig. 2(a) and (b) for both Case 1 and 2 respectivey. Fig. 3 compares the secrecy outage probabiities of the maxratio scheme for Cases 1 and 2, where the buffer size is fixed at L 3, the average gain ratios are set as M 1 M 2 2 or 5, and the reay number is set as K 2 or 5. It is ceary shown that the max-ratio scheme in Case 1 has consistenty better performance than that in Case 2. Fig. 4 compares the secrecy outage probabiities of the max-ratio scheme for different numbers of reays, where the buffer size is fixed as L 5 and the average gain ratios are set as M 1 M 2 5. It is ceary shown that, in both cases, the increase of the reay number can significanty improve the secrecy outage performance. For exampe, for the target secrecy capacity γ sc.5, when the reay number is increased from K 2 to K 5, the secrecy outage probabiity decreases by approximatey 1 db in Case 1, and by amost 6 db in Case 2. This verifies the effectiveness of using the max-ratio reay seection in improving the secrecy performance. Fig. 5 compares the secrecy outage probabiities of the max-ratio scheme for different reay buffer sizes, where the reay number and average gain ratio are fixed at K 4 and M 1 M 2 5, respectivey. Whie both the theoretica and simuation resuts have been obtained and perfecty match each other, ony the theoretica resuts are shown in Fig. 5 as otherwise it woud be too congested for iustration. Particuary, for L in Case 1, K 1 and K 2 for the virtua seection scheme (described in Section VI) are obtained as K 1 K 4andK respectivey. The theoretica resut for Case 1 is then obtained by using K 1 4, K to cacuate the outage probabiity in (1). On the other hand, the theoretica resut for L in Case 2 is obtained by using K 1 K 2 K 4 in the corresponding outage probabiity expression. In both Cases 1 and 2, for L, the simuation resuts are actuay obtained by using a very arge buffer size L 5. It is ceary shown that, for both Cases 1 and 2, the secrecy outage probabiity decreases with the increase of the buffer size L, but the improvement becomes ess significant as L increases. In fact, when L 5, the
11 CHEN et a.: MAX-RATIO RELAY SELECTION IN SECURE BUFFER-AIDED COOPERATIVE WIRELESS NETWORKS 727 secrecy outage probabiity is aready very cose to that for L. Fig. 6 shows the secrecy outage probabiities vs the SNR for the proposed max-ratio scheme. It is cear that, in both Cases 1 and 2, the secrecy outage probabiity improves significanty with increased number of the reay nodes. VIII. CONCLUSION This paper proposed a new max-ratio reay seection poicy for secure buffer-aided cooperative DF networks. With the hep of buffers at the reays, the best reay was seected with the argest gain ratio among a avaiabe source-to-reay and reayto-destination inks. Both cases with knowedge of exact and average gain for eavesdropping inks were considered, and for the first time, in the chaenging secure transmission context, cosed-form expressions for the secrecy outage probabiities for both cases were derived. Both anaysis and simuations show that the proposed max-ratio reay seection has significanty better performance in secrecy outage probabiity than the benchmark max-min-ratio scheme, and provides an attractive way to reaize and improve secure transmission at the physica ayer of wireess communications. APPENDIX I PROOF OF (17) Noting the definition of x and y in Section IV-A, we have s P(x < y) x<y y f XY (x, y)dxdy f XY (x, y)dxdy, (31) where f XY (x, y) is the joint PDF of x and y. From the CDF-s of x and y given by (13) and (14) respectivey, the PDF-s of x and y are obtained as f X (x) K 1 i C i K 1 ( 1) i+1 M 1 i (M 1 +ix) 2 and f Y (y) y K2 1 K 2 M 2 (M 2 +y) K 2+1, (32) respectivey. Because x and y are mutuay independent, we have K 1 CK i f XY (x, y) f X (x) f Y (y) 1 ( 1) i+1 M 1 M 2 K 2 iy K 2 1 (M 1 +ix) 2 (M 2 +y) K. 2+1 i Substituting (33) into (31) gives s K 1 y K 1 i CK i 1 ( 1) i+1 M 1 M 2 K 2 iy K 2 1 (M 1 + ix) 2 (M 2 + y) K dxdy 2+1 (33) 1+ CK i 1 ( 1) i y K 2 1 M 1 M 2 K 2 (M 1 + iy)(m 2 + y) K 2+1 dy. i1 (34) Then according to [38], if K 2 > 1, we obtain K 1 ( ) K2 s 1 + CK i 1 ( 1) i M1 K 2 B(2, K 2 ) M 2 i i1 F 2,1 ( [K 2 + 1, K 2 ], K 2 + 2, 1 M 1 M 2 i if K 2 1andM 1 M 2,wehave K 1 i2 ) ; (35) s 1 K 1 /2 + CK i i i[n(i) 1]+1 1 ( 1) (i 1) 2 ; (36) and if K 2 1andM 1 M 2,wehave s 1 + CK i 1 ( 1) i M 1 K 1 i1 in(i)m 2 + in(m 2 )M 2 in(m 1 )M 2 im 2 + M 1 (M 1 im 2 ) 2. (37) ACKNOWLEDGMENT We woud ike to thank the anonymous reviewers and the editor for their constructive comments. REFERENCES [1] E. D. Siva, A. L. D. Santos, L. C. P. Abini, and M. Lima, Identitybased key management in mobie ad hoc networks: Techniques and appications, IEEE Trans. Wireess Commun., vo. 15, no. 5, pp , Oct. 28. [2] A. D. Wyner, The wire-tap channe, Be Syst. Tech. J., vo. 54, pp , Jan [3] R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, Discrete memoryess interference and broadcast channes with confidentia messages: Secrecy rate regions, IEEE Trans. Inf. Theory, vo. 54, no. 6, pp , Jun. 28. [4] M. Boch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughin, Wireess information-theoretic security, IEEE Trans. Inf. Theory, vo. 54, no. 6, pp , Jun. 28. [5] S. K. L. Y. Cheong and M. E. Heman, The Gaussian wiretap channe, IEEE Trans. Inf. Theory, vo. 24, no. 4, pp , Ju [6] Y. Liang, H. V. Poor, and S. Shamai, Secure communication over fading channes, IEEE Trans. Inf. Theory, vo. 54, no. 6, pp , Jun. 28. [7] P. K. Gopaa, L. Lai, and H. E. Gama, On the secrecy capacity of fading channes, IEEE Trans. Inf. Theory, vo. 54, no. 1, pp , Oct. 28. [8] Y. Liang and H. V. Poor, Mutipe-access channes with confidentia messages, IEEE Trans. Inf. Theory, vo. 54, no. 3, pp , Mar. 28. [9] I. Csiszr and P. Narayan, Secrecy capacities for mutitermina channe modes, IEEE Trans. Inf. Theory, vo. 54, no. 6, pp , Jun. 28. [1] A. Khisti, A. Tchamkerten, and G. W. Worne, Secure broadcasting over fading channes, IEEE Trans. Inf. Theory, vo. 54, no. 6, pp , Jun. 28. [11] A. Papadogiannis, H. Bang, D. Gesbert, and E. Hardouin, Efficient seective feedback design for mutice cooperative networks, IEEE Trans. Veh. Techno., vo. 6, no. 1, pp , Jan [12] Y. J. Fan, C. Wang, J. Thompson, and H. V. Poor, Recovering mutipexing oss through successive reaying using repetition coding, IEEE Trans. Wireess Commun., vo. 6, no. 12, pp , Dec. 27. [13] P. Popovski and O. Simeone, Wireess secrecy in ceuar systems with infrastructure-aided cooperation, IEEE Trans. Inf. Forensics Security, vo. 4, no. 2, pp , Jun. 29.
12 728 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 214 [14] L. Dong, Z. Han, A. P. Petropuu, and H. V. Poor, Secure wireess communications via cooperation, in Proc. 46th Ann. Aerton Conf. Commun., Contro, Comput., Champaign, IL, USA, Sep. 28, pp [15] L. Dong, Z. Han, A. P. Petropuu, and H. V. Poor, Ampify-and-forward based cooperation for secure wireess communications, in Proc. IEEE Int. Conf. Acoust., Speech, Signa Process., Taipei, Taiwan, Apr. 29, pp [16] E. Tekin and A. Yener, The mutipe access wire-tap channe: Wireess secrecy and cooperative jamming, in Proc. Inf. Theory App. Workshop, San Diego, CA, USA, Jan. 27, pp [17] E. Tekin and A. Yener, The genera Gaussian mutipe access and two-way wire-tap channes: Achievabe rates and cooperative jamming, IEEE Trans. Inf. Theory, vo. 54, no. 6, pp , Jun. 28. [18] Z. Ding, M. Peng, and H. H. Chen, A genera reaying transmission protoco for MIMO secrecy communications, IEEE Trans. Commun., vo. 6, no. 11, pp , Nov [19] I. Krikidis, Opportunistic reay seection for cooperative networks with secrecy constraints, IET Commun., vo. 4, no. 15, pp , Oct. 21. [2] I. Krikidis, J. Thompson, and S. Mcaughin, Reay seection for secure cooperative networks with jamming, IEEE Trans. Wireess Commun., vo. 8, no. 1, pp , Oct. 29. [21] G. Chen, V. Dwyer, I. Krikidis, J. S. Thompson, S. McLaughin, and J. A. Chambers, Comment on Reay seection for secure cooperative networks with jamming, IEEE Trans. Wireess Commun., vo. 11, no. 6, pp , Jun [22] J. C. Chen, R. Q. Zhang, L. Y. Song, Z. Han, and B. L. Jiao, Joint reay and jammer seection for secure two-way reay networks, IEEE Trans. Inf. Forensics Security, vo. 7, no. 1, pp , Feb [23] Z. Ding, Y. Gong, T. Ratnarajah, and C. Cowan, On the performance of opportunistic cooperative wireess networks, IEEE Trans. Commun., vo. 56, no. 8, pp , Aug. 28. [24] A. Betsas, A. Khisti, D. P. Reed, and A. Lippman, A simpe cooperative diversity method based on network path seection, IEEE J. Se. Areas Commun., vo. 24, no. 3, pp , Mar. 26. [25] I. Krikidis, T. Charaambous, and J. S. Thompson, Buffer-aided reay seection for cooperative diversity systems without deay constraints, IEEE Trans. Wireess Commun., vo. 11, no. 5, pp , May 212. [26] H. Liu, P. Popovski, E. Carvaho, and Y. Zhao, Sum-rate optimization in a two-way reay network with buffering, IEEE Commun. Lett., vo. 17, no. 1, pp , Jan [27] A. Ikhef, D. S. Michaopouos, and R. Schober, Max-max reay seection for reays with buffers, IEEE Trans. Wireess Commun., vo. 11, no. 3, pp , May 212. [28] N. Zatanov, R. Schober, and L. Lampe, Buffer-aided reaying in a three node network, in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Ju. 212, pp [29] N. Zatanov, R. Schober, and P. Popovski, Buffer-aided reaying with adaptive ink seection, IEEE J. Se. Areas Commun., vo. 31, no. 8, pp , Aug [3] B. Xia, Y. Fan, J. Thompson, and H. V. Poor, Buffering in a threenode reay network, IEEE Trans. Wireess Commun., vo. 7, no. 11, pp , Nov. 28. [31] L. Lai and H. E. Gama, The reay eavesdropper channe: Cooperation for secrecy, IEEE Trans. Inf. Theory, vo. 54, no. 9, pp , Sep. 28. [32] A. Ghasemi and E. S. Sousa, Fundamenta imits of spectrum-sharing in fading environment, IEEE Trans. Wireess Commun., vo. 6, no. 2, pp , Feb. 27. [33] K. Hamdi, W. Zhang, and K. B. Letaief, Power contro in cognitive radio systems based on spectrum sensing side information, in Proc. IEEE Int. Conf. Commun., Gasgow, Scotand, Jun. 27, pp [34] C. M. Grinstead and J. L. Sne, Introduction to Probabiity, 2nd ed. Providence, RI, USA: Amer. Math. Soc., 1991, ch. 11. [35] J. R. Norris, Markov Chains. Cambridge, U.K.: Cambridge Univ. Press, [36] A. Berman and R. J. Pemmons, Nonnegative Matrices in the Mathematica Sciences. Phiadephia, PA, USA: Soc. Ind. App. Math, [37] H. A. David, Order Statistics, 2nd ed. Hoboken, NJ, USA: Wiey, [38] I. S. Gradshteyn and I. M. Ryzhik, Tabe of Integras, Series, and Products, 7th ed. New York, NY, USA: Esevier, 27. Gaojie Chen (S 9 M 12) received the B.Eng. and B.Ec. degrees in eectrica information engineering and internationa economics and trade from the Northwest University, Shaanxi, China, in 26, and the M.Sc. and Ph.D. degrees in eectrica and eectronic engineering from Loughborough University, Loughborough, U.K., in 28 and 212, respectivey. From 28 to 29, he was a Software Engineer with DTmobie, Beijing, China, and from 212 to 213, as a Research Associate with the Schoo of Eectronic, Eectrica, and Systems Engineering, Loughborough University. He is currenty a Research Feow with the Facuty of Engineering and Physica Sciences, University of Surrey, Guidford, U.K. His current research interests incude information theory, wireess communications, cooperative communications, cognitive radio, and secrecy communications. Zhao Tian (S 12) received the B.Eng. degree from the Schoo of Eectronic, Eectrica, and Systems Engineering, Loughborough University, U.K., in 212. He is currenty pursuing the Ph.D. degree at the Advanced Digita Signa Process Group, Schoo of Eectronic, Eectrica, and Systems Engineering, Loughborough University, U.K., with a fu postgraduate schoarship from the Engineering and Physica Sciences Research Counci. His current research interests incude the genera fied of wireess communications with emphasis on buffer-aided reaying. Yu Gong was with the Schoo of Eectronic, Eectrica, and Systems Engineering, Loughborough University, U.K., in 212. He received the B.Eng. and M.Eng. degrees in eectronic engineering from the University of Eectronics and Science Technoogy, China, in 1992 and 1995, respectivey, and the Ph.D. degree in communications from the Nationa University of Singapore, in 22. After the Ph.D. graduation, he took severa research positions with the Institute of Inforcomm Research, Singapore, and the Queen s University of Befast, U.K. From 26 to 212, he has been an Academic Member with the Schoo of Systems Engineering, University of Reading, U.K. His current research interests are in the area of signa processing and communications, incuding wireess communications, cooperative networks, and noninear and nonstationary system identification and adaptive fiters. Zhi Chen (M 4) received the B.Eng., M.Eng., and Ph.D. degrees in eectrica engineering from the University of Eectronic Science and Technoogy of China (UESTC), in 1997, 2, and 26, respectivey. After the Ph.D. graduation, he joined the Nationa Key Laboratory of Science and Technoogy on Communications, UESTC, where he was promoted to Professor in 213. He was a Visiting Schoar with the University of Caifornia, Riverside, from 21 to 211. His current research interests incude wireess communication and signa processing, specificay reay and cooperative communications, interference coordination, and canceation. He has served as a Reviewer for various internationa journas and conferences, incuding the IEEE TRANSACTIONS ON SIGNAL PROCESSING and the IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY.
13 CHEN et a.: MAX-RATIO RELAY SELECTION IN SECURE BUFFER-AIDED COOPERATIVE WIRELESS NETWORKS 729 Jonathon A. Chambers (S 83 M 9 SM 98 F 11) received the Ph.D. and D.Sc degrees in signa processing from the Imperia Coege of Science, Technoogy, and Medicine (Imperia Coege London), London, U.K., in 199 and 214, respectivey. From 1991 to 1994, he was a Research Scientist with the Schumberger Cambridge Research Center, Cambridge, U.K. In 1994, he returned to Imperia Coege London, as a Lecturer in signa processing and was promoted as a Reader (Associate Professor) in From 21 to 24, he was the Director with the Centre for Digita Signa Processing and a Professor of signa processing with the Division of Engineering, King s Coege London, London. From 24 to 27, he was a Cardiff Professoria Research Feow with the Schoo of Engineering, Cardiff University, Waes, U.K. In 27, he joined the Department of Eectronic and Eectrica Engineering, Loughborough University, Loughborough, U.K., where he heads the Advanced Signa Processing Group and serves as the Associate Dean (Research) for Loughborough University. He is a coauthor of the books Recurrent Neura Networks for Prediction: Learning Agorithms, Architectures, and Stabiity (Hoboken, NJ, USA: Wiey, 21) and EEG Signa Processing (Hoboken, NJ, USA: Wiey, 27). He has advised more than 5 researchers through to Ph.D. graduation and pubished more than 35 conference proceedings and journa artices, many of which are in IEEE journas. His current research interests incude adaptive and bind signa processing, and their appications. He is a feow of the Roya Academy of Engineering, U.K., and the Institution of Eectrica Engineers. He was the Technica Program Chair of the 15th Internationa Conference on Digita Signa Processing and the 29 IEEE Workshop on Statistica Signa Processing, both hed in Cardiff, U.K., and a Technica Program Cochair for the 36th IEEE Internationa Conference on Acoustics, Speech, and Signa Processing, Prague, Czech Repubic. He received the first QinetiQ Visiting Feowship in 27 for his outstanding contributions to adaptive signa processing and his contributions to QinetiQ as a resut of his successfu industria coaboration with the internationa defense systems company QinetiQ. He has served on the IEEE Signa Processing Theory and Methods Technica Committee for six years, the IEEE Signa Processing Society Awards Board for three years, and is currenty a member of the IEEE Signa Processing Conference Board and the European Signa Processing Society Best Paper Awards Seection Pane. He has served as an Associate Editor of the IEEE TRANSACTIONS ON SIGNAL PROCESSINGfor three terms from 1997 to 1999, from 24 to 27, and since 211, and is currenty a Senior Area Editor.
Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels
Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver
More informationIterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels
Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of
More informationBER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel
Internationa Journa of Computer ppications (0975 8887) Voume 5 No.11, Juy 011 BER Performance naysis of Cognitive Radio Physica Layer over Rayeigh fading mandeep Kaur Virk Dr. B R mbedkar Nationa Institute
More informationRate-Allocation Strategies for Closed-Loop MIMO-OFDM
Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu
More informationRateless Codes for the Gaussian Multiple Access Channel
Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W
More informationDual Relay Selection for Cooperative NOMA with Distributed Space Time Coding
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI.9/ACCESS.8.846, IEEE Access
More informationImproving the Active Power Filter Performance with a Prediction Based Reference Generation
Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source
More informationCAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS
CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS Susan Joshy and A.V. Babu, Department of Eectronics & Communication Engineering, Nationa Institute
More informationSatellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic
Sateite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Jing Zhu and Sumit Roy Department of Eectrica Engineering, University of Washington Box 352500, Seatte, WA 98195, USA
More informationSecure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits
Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: +9
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003.
Coon, J., Siew, J., Beach, MA., Nix, AR., Armour, SMD., & McGeehan, JP. (3). A comparison of MIMO-OFDM and MIMO-SCFDE in WLAN environments. In Goba Teecommunications Conference, 3 (Gobecom 3) (Vo. 6, pp.
More informationJoint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks
Proceedings of SDR'11-WInnComm-Europe, 22-24 Jun 2011 Joint Optima Power Aocation and Reay Seection with Spatia Diversity in Wireess Reay Networks Md Habibu Isam 1, Zbigniew Dziong 1, Kazem Sohraby 2,
More informationUtility-Proportional Fairness in Wireless Networks
IEEE rd Internationa Symposium on Persona, Indoor and Mobie Radio Communications - (PIMRC) Utiity-Proportiona Fairness in Wireess Networks G. Tychogiorgos, A. Gkeias and K. K. Leung Eectrica and Eectronic
More informationDealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection?
Deaing with Lin Bocage in mmwave etwors: DD Reaying or Muti-beam Refection? Mingjie Feng, Shiwen Mao Dept. Eectrica & Computer Engineering Auburn University, Auburn, AL 36849-5, U.S.A. Tao Jiang Schoo
More informationResource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks
Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,
More informationPerformance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM
Performance Measures of a UWB Mutipe-Access System: DS/CDMA versus TH/PPM Aravind Kaias and John A. Gubner Dept. of Eectrica Engineering University of Wisconsin-Madison Madison, WI 53706 akaias@wisc.edu,
More informationChannel Division Multiple Access Based on High UWB Channel Temporal Resolution
Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:
More informationResource Allocation via Linear Programming for Fractional Cooperation
1 Resource Aocation via Linear Programming for Fractiona Cooperation Nariman Farsad and Andrew W Ecford Abstract In this etter, resource aocation is considered for arge muti-source, muti-reay networs empoying
More informationCo-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel
Co-channe Interference Suppression Techniques for STBC OFDM System over Douby Seective Channe Jyoti P. Patra Dept. of Eectronics and Communication Nationa Institute Of Technoogy Rourkea-769008, India E
More informationBest Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks
IEEE ICC 1 - Wireess Communications Symposium Best Reay Seection Using SNR and Interference Quotient for Underay Cognitive Networks Syed Imtiaz Hussain 1, Mohamed M. Abdaah 1, Mohamed-Sim Aouini 1,, Mazen
More informationA Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access
0 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 5, NO., JUNE 007 A Low Compexity VCS Method for PAPR Reduction in Muticarrier Code Division Mutipe Access Si-Si Liu, Yue iao, Qing-Song Wen,
More informationRelays that Cooperate to Compute
Reays that Cooperate to Compute Matthew Nokeby Rice University nokeby@rice.edu Bobak Nazer Boston University bobak@bu.edu Behnaam Aazhang Rice University aaz@rice.edu Natasha evroye University of Iinois
More informationA CPW-Fed Printed Monopole Ultra-Wideband Antenna with E-Shaped Notched Band Slot
Iraqi Journa of Appied Physics Emad S. Ahmed Department of Eectrica and Eectronic Engineering University of Technoogy, Baghdad, Iraq A CPW-Fed Printed Monopoe Utra-Wideband Antenna with E-Shaped Notched
More informationCross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W.
www.ietd.org Pubished in IET Communications Received on 18th June 2009 Revised on 30th Juy 2009 ISSN 1751-8628 Cross-ayer queuing anaysis on mutihop reaying networks with adaptive moduation and coding
More informationPerformance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2
ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,
More informationFOR energy limited data networks, e.g., sensor networks,
578 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., DECEMBER 009 An Optima Power Aocation Scheme for the STC Hybrid ARQ over Energy Limited Networks Hongbo Liu, Member, IEEE, Leonid Razoumov,
More informationAvailability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique
Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang
More informationJoint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic
Joint Spectrum Access and Pricing in Cognitive Radio Networks with Eastic Traffic Joceyne Eias University of Bergamo E-mai: joceyne.eias@unibg.it Fabio Martignon University of Bergamo E-mai: fabio.martignon@unibg.it
More informationTHE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN
THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN A CDMA SYSTEM Yan Zhang, Laurence B. Mistein, and Pau H. Siege Department of ECE, University of Caifornia, San Diego
More informationSelf-Interference Canceller for Full-Duplex Radio Relay Station Using Virtual Coupling Wave Paths
Sef-Interference Canceer for Fu-Dupex Radio Reay Station Using Virtua Couping Wave Paths Kazunori Hayashi Yasuo Fujishima Megumi Kaneko Hideaki Sakai Riichi Kudo and Tomoki Murakami Graduate Schoo of Informatics,
More informationCapacity of Data Collection in Arbitrary Wireless Sensor Networks
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess
More informationPROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS
PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER SYSTEMS Junsung Lim, Hyung G. Myung, Kyungjin Oh and David J. Goodman Dept. of Eectrica and Computer Engineering, Poytechnic University 5 Metrotech
More informationSparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints
Sparse Beamforming Design for Networ MIMO System with Per-Base-Station Bachau Constraints Binbin Dai and Wei Yu Department of Eectrica and Computer Engineering University of Toronto, Toronto, Ontario M5S
More informationRelay Selection in Adaptive Buffer-Aided Space-Time Coding with TAS for Cooperative Wireless Networks
Asian Journal of Engineering and Applied Technology ISSN: 2249-068X Vol. 6 No. 1, 2017, pp.29-33 The Research Publication, www.trp.org.in Relay Selection in Adaptive Buffer-Aided Space-Time Coding with
More informationA Novel Method for Doppler and DOD- DOA Jointly Estimation Based on FRFT in Bistatic MIMO Radar System
7 Asia-Pacific Engineering and Technoogy Conference (APETC 7) ISBN: 978--6595-443- A Nove Method for Dopper and DOD- DOA Jointy Estimation Based on FRFT in Bistatic MIMO Radar System Derui Song, Li Li,
More informationarxiv: v4 [physics.soc-ph] 31 Dec 2013
A Cascading Faiure Mode by Quantifying Interactions Junjian Qi and Shengwei Mei Department of Eectrica Engineering, Tsinghua University, Beijing, China 100084 arxiv:1301.2055v4 [physics.soc-ph] 31 Dec
More informationADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL
ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar
More informationJoint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,
More informationEffect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM
Effect of Interfering Users on the Moduation Order and Code Rate for UWB Impuse-Radio Bit-Intereaved Coded M-ary PPM Ruben Merz and Jean-Yves Le Boudec EPFL, Schoo of Computer and Communication Sciences
More informationFast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System
Fast Hybrid DF/D Architecture for OFDM in ognitive Radio System Zhu hen, Moon Ho Lee, Senior Member, EEE, hang Joo Kim 3 nstitute of nformation&ommunication, honbuk ationa University, Jeonju, 56-756,Korea
More informationMarketing tips and templates
For financia adviser use ony. Not approved for use with customers. Marketing tips and tempates Heping you to grow your equity reease business The growing equity reease market can offer many opportunities
More informationBlind Multiuser Detection in Asynchronous DS-CDMA Systems over Nakagami-m Fading Channels
Bind Mutiuser Detection in Asynchronous DS-CDMA Systems over akagami-m Fading Channes Vinay Kumar Pamua JU Kakinada, Andhra Pradesh, India 533 003 pamuavk@yahoo.com ABSRAC his paper presents a technique
More informationCharacteristics of a Novel Slow-Wave Defected Ground Structure for Planar Wideband Filters
2011 Internationa Conference on Information and Eectronics Engineering IPCSIT vo.6 (2011) (2011) IACSIT Press, Singapore Characteristics of a Nove So-Wave Defected Ground Structure for Panar Wideband Fiters
More informationWireless Communications
Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve
More informationarxiv: v1 [cs.it] 22 Aug 2007
Voice Service Support in Mobie Ad Hoc Networks Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Dept. of Eec. & Comp. Eng., University of Aberta, Canada, hai.jiang@ece.uaberta.ca Dept. of Eec.
More informationDistribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection
Distribution of ath Durations in Mobie Ad-Hoc Networks and ath Seection Richard J. La and Yijie Han Abstract We investigate the issue of path seection in mutihop wireess networks with the goa of identifying
More informationSCHEDULING the wireless links and controlling their
3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,
More informationDistributed Antenna System for Mitigating Shadowing Effect in 60 GHz WLAN
Distributed Antenna System for Mitigating Shadowing Effect in 60 GHz WLAN Citation for pubished version (APA): Wang, Q., Debbarma, D., Lo, A., Cao, Z., Niemegeers, I., & Heemstra, S. (2015). Distributed
More informationResource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays
Resource Aocation for Network-Integrated Device-to-Device Communications Using Smart Reays Monowar Hasan and Ekram Hossain Department of Eectrica and Computer Engineering, University of Manitoba, Winnipeg,
More informationOn optimizing low SNR wireless networks using network coding
On optimizing ow SNR wireess networks using network coding Mohit Thakur Institute for communications engineering, Technische Universität München, 80290, München, Germany. Emai: mohit.thakur@tum.de Murie
More informationCooperative Caching in Dynamic Shared Spectrum Networks
Fina version appears in IEEE Trans. on Wireess Communications, 206. Cooperative Caching in Dynamic Shared Spectrum Networs Dibaar Das, Student Member, IEEE, and Ahussein A. Abouzeid, Senior Member, IEEE
More informationTEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS
TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS Ingmar Hammerström, Jian Zhao, and Armin Wittneben Swiss Federa Institute of Technoogy (ETH)
More informationResource management for network-assisted D2D communication DEMIA DELLA PENDA
Resource management for network-assisted D2D communication DEMIA DELLA PENDA Licentiate Thesis Stockhom, Sweden 2016 TRITA-EE 2016:035 ISSN 1653-5146 ISBN 978-91-7595-885-9 KTH Roya Institute of Technoogy
More informationPower Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks
roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,
More informationNetwork Control by Bayesian Broadcast
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-33, NO. 3, MAY 1987 323 Network Contro by Bayesian Broadcast RONALD L. RIVEST Abstract-A transmission contro strategy is described for sotted- ALOHA-type
More information1860 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 2, FEBRUARY 2017
1860 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 2, FEBRUARY 2017 Correspondence Near-Optima Signa Detector Based on Structured Compressive Sensing for Massive SM-MIMO Zhen Gao, Lingong Dai,
More informationRun to Potential: Sweep Coverage in Wireless Sensor Networks
Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,
More informationAn Approach to use Cooperative Car Data in Dynamic OD Matrix
An Approach to use Cooperative Car Data in Dynamic OD Matrix Estimation L. Montero and J. Barceó Department of Statistics and Operations Research Universitat Poitècnica de Cataunya UPC-Barceona Tech Abstract.
More informationWorst case delay analysis for a wireless point-to-point transmission
Worst case deay anaysis for a wireess point-to-point transmission Katia Jaffrès-Runser University of Tououse IRIT - INPT ENSEEIHT Tououse, France Emai: katia.jaffres-runser@irit.fr Abstract Wireess technoogies
More informationTop Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobility Fading Channels
Top Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobiity Fading Channes Juinn-Horng Deng, Feng-Chin Hsiao, and Yi-Hsin Lin Department of Communications Engineering
More informationOn the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel
On the Reationship Between Queuing Deay and Spatia Degrees of Freedom in a IO utipe Access Channe Sriram N. Kizhakkemadam, Dinesh Rajan, andyam Srinath Dept. of Eectrica Engineering Southern ethodist University
More informationMinimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks
1 Minimizing Distribution Cost of Distributed Neura Networks in Wireess Sensor Networks Peng Guan and Xiaoin Li Scaabe Software Systems Laboratory, Department of Computer Science Okahoma State University,
More informationOn the Relationship Between Capacity and Distance in an Underwater Acoustic Communication Channel
On the Reationship Between Capacity and Distance in an Underwater Acoustic Communication Channe Miica Stojanovic Massachusetts Institute of Technoogy miitsa@mit.edu ABSTRACT Path oss of an underwater acoustic
More informationAN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS
SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp. 702 712, June 1998 008 AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR
More informationP H O T O CD I N F O R M A T I O N B U L L E T I N
PCD 077 Juy, 1994 Copyright, Eastman Kodak Company, 1994 P H O T O CD I N F O R M A T I O N B U L L E T I N Fuy Utiizing Photo CD Images Maintaining Coor Consistency When Creating KODAK Photo CD Portfoio
More informationStability Analysis for Network Coded Multicast Cell with Opportunistic Relay
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast
More informationSimulation Model for a Frequency-Selective Land Mobile Satellite Communication Channel
Vo 3, No., Simuation Mode for a Frequency-Seective Land Mobie Sateite Communication Channe Abstract Zachaeus K. Adeyemo, Oumide O. Ajayi *, Festus K. Ojo 3. Department of Eectronic and Eectrica Engineering,
More informationConfiguring Onyx to print on your HEXIS media
Configuring Onyx to print on your HEXIS media 1. Instaing a media profie suitabe for your HEXIS printing media 1.1. Downoading the media profie 2 1.2. Importing the media profie into Onyx 3 2. Defaut setting
More informationCOMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS
COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director
More informationImplementation of PV and PIV Control for Position Control of Servo Motor
IJSRD - Internationa Journa for Scientific Research & Deveopment Vo. 5, Issue 1, 2017 ISSN (onine): 2321-0613 Impementation of PV and PIV Contro for Position Contro of Servo Motor J.Priya 1 R.Rambrintha
More informationPulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis
Pused RF Signas & Frequency Hoppers Using Rea Time Spectrum Anaysis 1 James Berry Rohde & Schwarz Pused Rea Time and Anaysis Frequency Seminar Hopper Agenda Pused Signas & Frequency Hoppers Characteristics
More informationAn Optimization Framework for XOR-Assisted Cooperative Relaying in Cellular Networks
n Optimization Framework for XOR-ssisted Cooperative Reaying in Ceuar Networks Hong Xu, Student Member, IEEE, Baochun Li, Senior Member, IEEE bstract This work seeks to address two questions in cooperative
More informationSource Transmit Antenna Selection for MIMO Decode-and-Forward Relay Networks
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 7, APRIL 1, 2013 1657 Source Transmit Antenna Selection for MIMO Decode--Forward Relay Networks Xianglan Jin, Jong-Seon No, Dong-Joon Shin Abstract
More informationPerformance Analysis of Non-Orthogonal Multiple Access under I/Q Imbalance
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/ACCESS.2018.2820074,
More informationComparison of One- and Two-Way Slab Minimum Thickness Provisions in Building Codes and Standards
ACI STRUCTURAL JOURNAL Tite no. 107-S15 TECHNICAL PAPER Comparison of One- and Two-Way Sab Minimum Thickness Provisions in Buiding Codes and Standards by Young Hak Lee and Andrew Scanon Minimum thickness
More informationGeorgia Institute of Technology. simulating the performance of a 32-bit interconnect bus. referenced to non-ideal planes. A transient simulation
Power ntegrity/signa ntegrity Co-Simuation for Fast Design Cosure Krishna Srinivasan1, Rohan Mandrekar2, Ege Engin3 and Madhavan Swaminathan4 Georgia nstitute of Technoogy 85 5th St NW, Atanta GA 30308
More informationDistributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach
Distributed Resource Aocation for Reay-Aided Device-to-Device Communication Under Channe Uncertainties: A Stabe Matching Approach Monowar Hasan, Student Member, IEEE, and Ekram Hossain, Feow, IEEE Abstract
More informationFAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM
FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM by Wenchen Wang Bacheor of Engineering, Northeastern University, China 2013 M.S. in Computer Science, University of Pittsburgh, 2017
More informationIN RECENT years, wireless multiple-input multiple-output
1936 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 6, NOVEMBER 2004 On Strategies of Multiuser MIMO Transmit Signal Processing Ruly Lai-U Choi, Michel T. Ivrlač, Ross D. Murch, and Wolfgang
More informationSpatial Characteristics of 3D MIMO Wideband Channel in Indoor Hotspot Scenario at 3.5 GHz
Spatia Characteristics of 3D MIMO Wideband Channe in Indoor Hotspot Scenario at 3.5 GHz ei Tian Jianhua Zhang Yuxiang Zhang State Key ab. of Networking and Switching Tech. Beijing Univ. of osts and Teecom.
More informationModel of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network
Mode of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobie Ad Hoc Network Igor Konstantinov, Kostiantyn Poshchykov, Sergej Lazarev, and Oha Poshchykova Begorod State University, Pobeda Street 85,
More informationLow Delay Wind Noise Cancellation for Binaural Hearing Aids
INTER-NOISE 6 Low Deay Wind Noise Canceation for Binaura Hearing Aids Nobuhio HIRUMA ; Ryousue KOUYAMA ; Hidetoshi NAKASHIMA 3 ; Yoh-ichi FUJISAKA 4, 4 Rion Co., Ltd, Japan, 3 Nationa Institute of Technoogy,
More informationSecrecy Outage Analysis over Correlated Composite Nakagami-m/Gamma Fading Channels
Secrecy Outage Anaysis over Correated Composite Nakagami-m/Gamma Fading Channes George C. Aexandropouos, Senior Member, IEEE and Kostas P. Peppas, Senior Member, IEEE arxiv:7.9v [cs.it] 3 Oct 7 Abstract
More informationCommunication Systems
Communication Systems 1. A basic communication system consists of (1) receiver () information source (3) user of information (4) transmitter (5) channe Choose the correct sequence in which these are arranged
More informationGeneralized constrained energy minimization approach to subpixel target detection for multispectral imagery
Generaized constrained energy minimization approach to subpixe target detection for mutispectra imagery Chein-I Chang, MEMBER SPIE University of Maryand Batimore County Department of Computer Science and
More informationWIFI-BASED IMAGING FOR GPR APPLICATIONS: FUNDAMENTAL STUDY AND EXPERIMENTAL RESULTS
WIFI-BASED IMAGING FOR GPR APPICATIONS: FUNDAMENTA STUDY AND EXPERIMENTA RESUTS Weike Feng *, Jean-Miche Friedt, Zhipeng Hu 3, Grigory Cherniak, and Motoyuki Sato 4 Graduate Schoo of Environmenta Studies,
More informationRandom Beamforming with Multi-beam Selection for MIMO Broadcast Channels
Random Beamforming with Multi-beam Selection for MIMO Broadcast Channels Kai Zhang and Zhisheng Niu Dept. of Electronic Engineering, Tsinghua University Beijing 84, China zhangkai98@mails.tsinghua.e.cn,
More informationRadial basis function networks for fast contingency ranking
Eectrica Power and Energy Systems 24 2002) 387±395 www.esevier.com/ocate/ijepes Radia basis function networks for fast contingency ranking D. Devaraj a, *, B. Yegnanarayana b, K. Ramar a a Department of
More informationBlock-Level Unitary Query: Incorporating Orthogonal-like Space-time Code with Query Diversity for MIMO Backscatter RFID
1 Bock-Leve Unitary Query: Incorporating Orthogona-ike Space-time Code with Query Diversity for MIMO Backscatter RFID Chen He, Member, IEEE, Z. Jane Wang, Senior Member, IEEE, and Victor C.M. Leung, Feow,
More informationSparse Channel Estimation Based on Compressed Sensing for Massive MIMO Systems
Sparse Channe Estimation Based on Compressed Sensing for Massive MIMO Systems Chenhao Qi, Yongming Huang, Shi Jin and Lenan Wu Schoo of Information Science and Engineering, Southeast University, Nanjing
More informationA Distributed Utility Max-Min Flow Control Algorithm
A Distributed tiity Max-Min Fow Contro Agorithm Hyang-Won Lee and Song Chong Department of Eectrica Engineering and Computer Science Korea Advanced Institute of Science and Technoogy (KAIST) mshw@netsys.kaist.ac.kr,
More informationIEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 Finite-State Markov Modeing for Wireess Channes in Tunne Communication-Based Train Contro Systems Hongwei Wang, Fei Richard Yu, Senior Member,
More informationTHE EMERGING IEEE ad wireless local area
1 Suboptima Spatia Diversity Scheme for 60 Gz Miimeter-Wave WLAN Zhenyu Xiao, Member, IEEE arxiv:1511.02326v1 [cs.it] 7 Nov 2015 Abstract This etter revisits the equa-gain (EG) spatia diversity technique,
More informationAdaptive Bit and Power Allocation for Rate and Margin Maximization in V-BLAST System
Revista Científica Periódica - Teecomunicações ISSN 56-338 Adaptive Bit and Power Aocation for Rate and argin aximization in V-BAST System Dror eiri and Irving Kaet Aeis Photonics, Netanya, Israe (emai:
More informationAalborg Universitet On Radiated Performance Evaluation of Massive MIMO Devices in Multi-Probe Anechoic Chamber OTA Setups General rights
Aaborg Universitet On Radiated Performance Evauation of Massive MIMO Devices in Muti-Probe Anechoic Chamber OTA Setups Kyösti, Pekka; Hentiä, Lassi; Fan, Wei; Lehtomaki, Janne; Latva-aho, Matti Pubished
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 1, JANUARY
IEEE TAACTIO O WIELE COMMUICATIO, VOL. 7, O., JAUAY 208 477 Buffer-Aided eaying For The Two-Hop Fu-Dupex eay Channe With ef-interference Mohsen Mohammadkhani azighi, tudent Member, IEEE, and ikoa Zatanov,
More informationCHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI
CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI Jivisha, Gaurav Mohta, Saumya Das Siim Manipa Institute of Technoogy Emai Id- gauravmohta.officia@gmai.com; Ph No. +9 9609850304 Abstract Wi-Fi or wireess
More information: taking service robots to play soccer
Virbot@fied : taking service robots to pay soccer Larena Adaberto, Escaante Boris, Torres Luis, Abad Verónica, Vázquez Lauro Bio-Robotics Laboratory, Department of Eectrica Engineering Universidad Naciona
More informationFig.1channel model of multiuser ss OSTBC system
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. V (Feb. 2014), PP 48-52 Cooperative Spectrum Sensing In Cognitive Radio
More informationAn Efficient Adaptive Filtering for CFA Demosaicking
Dev.. Newin et. a. / (IJCSE) Internationa Journa on Computer Science and Engineering An Efficient Adaptive Fitering for CFA Demosaicking Dev.. Newin*, Ewin Chandra Monie** * Vice Principa & Head Dept.
More information