Joint Cooperative Relaying and Jamming for Maximum Secrecy Capacity in Wireless Networks
|
|
- Scarlett Holland
- 5 years ago
- Views:
Transcription
1 Joint Cooperative Relaying an Jamming for Maximum Secrecy Capacity in Wireless Networks Li Wang, Chunyan Cao, Mei Song an Yu Cheng Beijing Key Laboratory of Work Safety Intelligent Monitoring School of Electronic Engineering, Beijing University of Posts an Telecommunications, Beijing, P.R. China Department of Electrical an Computer Engineering Illinois Institute of Technology 330 S. Dearborn Street, Siegel Hall 320 Chicago, IL Abstract This paper proposes a joint cooperative relaying an jamming scheme base on istribute beamforming to enhance the secrecy rate of a wireless channel in the presence of an eavesropper. Specifically, we consier the scenario that a source noe transmits messages to a estination with the help of multiple cooperative relays, where a relay might be compromise to become an eavesropper as an insie attacker. Our joint relaying an jamming approach is to assign some relay noes to act as jammers to interfere the eavesropper, while the remaining ones continue relaying information to the estination. We propose a protocol to implement the joint cooperative relaying an jamming. Our protocol further consiers the particular challenge brought by the insie attacker: it may know the jamming signal an can use it to remove the interference from the jammers. The issue of phase an frequency synchronization in the istribute beamforming is also taken into account. A mixe integer programming problem is formulate to maximize the secrecy rate with the propose joint relaying an jamming, by which the optimal role assignment to a relay an the associate optimal power assignment can be solve. Numerical results are presente to emonstrate the efficiency of the propose joint relaying an jamming in improving the secrecy rate, with comparison to existing approaches. Inex Terms Cooperative relaying an jamming, istribute beamforming, synchronization, insie attacker, secrecy rate. I. INTRODUCTION Recently, physical layer security has been regare as a promising approach to aress security issues in wireless networks without upper-layer encryption, which exploits the physical characteristics of the wireless channels to ensure secure communications. Secrecy rate is efine as the rate at which information can be transmitte secretly from the source to its intene estination in the presence of eavesroppers, an the maximum achievable secrecy rate is name the secrecy capacity. In [], Aaron Wyner introuce the wiretap channel an establishe the funamental results of creating perfect secure communications without cryptographic techniques involve. Wyner s approach was extene to Gaussian wiretap channels an broacast channels in later works [2]-[3]. Cooperative transmission has attracte a lot of attention to enhance the capacity of a wireless channel as a virtual MIMO system [4]-[5]. The current efforts to improve the secrecy rate in the context of cooperative communications can be roughly classifie into three categories, cooperative beamforming, cooperative jamming, an hybri relaying an jamming. For cooperative beamforming, all relays resort to the istribute beamforming technique to concentrate the signal towars the intene estination, trying to mitigate the information leakage to the eavesropper as much as possible [6]- [7], [8]. The philosophy of cooperative jamming is that some relay noes concentrate certain jamming signal to interfere the eavesropper (normally by the istribute beamforming technique too) while not impact the estination [9]-[0], []. A relay equippe with multiple antennas for jamming was stuie in [0]. However, the cost of a multiple antenna system is normally high. The work in [2] presente a systematic stuy of cooperative beamforming an cooperative jamming. The cooperative jamming situation consiere in [2] only applies to the one-hop source to estination transmission though. Hybri relaying an jamming schemes to secure the networks were propose in [3]-[4], where some noes aopt istribute beamforming to relay the message an others jam the eavesroppers. It is worth noting that most of existing works, in all the three categories, consiere a given set of relay(s), jammer(s) an the eavesropper(s), which may not be the case in practice: a normal noe coul be compromise to turn into an attacker an the role of a relay noe coul be ynamically assigne. This paper consiers a practical scenario where a transmission with multiple cooperative relays starts at the normal state an the relays can apply istribute beamforming technique for high capacity. A relay noe might be compromise to become an eavesropper, which is an insie attacker. We assign some relay noes to act as jammers to interfere the eavesropper, while the rest continue relaying information to the estination. The unique issue in our scenario is the optimal role assignment to each relay, as a ata relay or a jammer, for maximum secrecy rate. We formulate a mixe integer programming problem. Furthermore, we consier the particular challenge brought by the insie attacker: all the jammers nee to transmit the same jamming symbols an use the istribute beamforming technique for effective jamming, however, the insie attacker may also know the jamming symbols (if preloae) an can use it to remove the interferences from the jammers. We thus esign a protocol to aress such an issue. In aition, our protocol incorporates operations for /4/$ IEEE 4448
2 Fig.. System moel for secure transmission. synchronization in istribute beamforming, which is ignore in most of the existing stuies on secrecy rate for cooperative communications. To make our scheme more efficient an practical, we introuce two hop istribute beamforming for joint cooperative relaying an jamming. The paper is organize as follows. Section II presents the system moel. Section III presents the protocol esign for joint cooperative relaying an jamming. Section IV formulates a mixe integer programming problem to maximize the secrecy rate. Numerical results are provie in Section V to emonstrate the performance. Section VI gives conclusion remarks. II. SYSTEM MODEL In this section, we will first present the system moel an then give a brief escription of the secure transmission between the source an the estination. As shown in Fig., we consier the scenario where a source nees to communicate with a estination uner the help of some cooperative relays in the DF manner. Each noe is equippe with a single omni-irectional antenna an operates in a half-uplex moe. We assume that channels for ifferent pairs of noes are inepenent an ientically istribute (i.i..) with flat Rayleigh faing, an the noise is the aitive white Gaussian noise (AWGN) with a mean of zero an a variance of σ 2. In the system, a relay noe might be compromise to become an eavesropper, as an insie attacker, which can be etecte by its malicious behavior. Some relay noes will be assigne as jammers to interfere the eavesropper, while the remaining ones continue relaying information to the estination. Here we assume the eavesropper can be locate by some existing techniques [5], an all caniate noes can successfully ecoe the message transmitte by the source as assume in [2]. The secure transmission process between the source an the estination can be ivie into two transmitting phases. In the first phase, the source broacasts the message, S, which is also listene by the eavesropper. To ecrease the interception, the jammers sen jamming signals, Z, at the same time. Distribute beamforming is employe at the jammers so that the jamming signals confuse the eavesropper only, without impacting the estination. In the secon phase, the relays utilize istribute beamforming to forwar the ata to the estination, while the jammers continue sening jamming signals to interfere the eavesropper. When useful message sent by the relays can be completely nulle out at the eavesropper using null space cooperative beamforming at the relays [8], the jamming is not neee an the transmit power of the jammer set can be set zero. While if cooperative beamforming at the relays oes not work well, the jammers interfere the eavesropper an ecrease its interception. Optimal power allocation to jammers an relays will be stuie in Section IV. We enote the channel gain form the source to the estination by h s, the channel gain form the source to the eavesropper by h se, the row channel gain vector ( N) from the source to all the caniate noes by h T sn, the column channel gain vector (N ) from all the caniate noes to the eavesropper by h Ne, the column channel gain vector (N ) from all the caniate noes to the estination by h N, the channel gain matrix (N N) between all the caniate noes by H N. N is the number of caniate noes. ( ) T is the transpose of a matrix or a vector. [x] + =max(0,x). III. JOINT COOPERATIVE RELAYING AND JAMMING In this section, we esign a protocol to implement the propose cooperative relaying an jamming scheme. The technique unerpinning of the joint relaying an jamming is the istribute beamforming. An important issue with istribute beamforming is the synchronization of the carrier signals in phase an frequency. The stuy in [6] presente an effective synchronization technique for istribute beamforming an inicate that the beamforming gain still remains goo even with imperfect synchronization. We evelop our protocol base on that use in [6]. Furthermore, the severe impact of insie attacks from the eavesropper can not be ignore. Cooperative jamming relies on istribute beamforming where the jammers nee to transmit the same jamming symbols for effective jamming, however, the eavesropper may also know the preefine jamming symbols an can use it to remove the interference. Our protocol utilizes on-line selection of the jamming signals rather than pre-installation to be against the insie attacker. Although we involve some cryptographic techniques here to eliver the on-line selecte jamming signal from the source to the jamming noes, the cryptographic technique just incurs some overhea to our cooperative relaying an jamming, an the secrecy rate still epens on the physical layer security technique. The propose protocol works as follows. First, the source generates a sinusoi signal c 0 (t) with a frequency f c base on its local oscillator an broacasts it. Here we assume that the source has one pair of public/private keys. The sinusoi signal c 0 (t) can be moulate with the public key of the source. The jammers use PLL (Phase Locking Loop) to lock on the frequency f c an the receive signal at the κth jammer noe is c κ,0 (t) with a phase shift θ κ. The jammers apply phase error correction techniques to eal with phase shift θ κ [6]. Then the κth jammer noe obtains the calibrate signal c κ (t) use for channel estimation an beamforming. All the jammers also emoulate the public key 4449
3 of the source to be use later for jamming signal transmission. An easier (but not that general) implementation is that the public key of the source is pre-installe into each relay noe. Secon, all the caniate noes an the estination then take turns to broacast a carrier signal so that each noe can estimate the channel gain between itself an the broacasting one. These channel gains can later be use for istribute beamforming, either for cooperative relaying to the estination or for jamming to the eavesropper. Thir, if each jammer obtains the public key of the source in the first step, it then uses this key to encrypt its session key to the source (here we use the local phase error as a session key, which is relate to the propagation elay of the wireless channel between the source an this jammer). The source can later use the session key to sen upate jamming signals use for istribute beamforming to the jammers, which is similar to the metho in [7] by exploiting the wireless channel for builing cryptographic services. Last, at a certain moment, if the source announces the eavesropper, it will sen the upate jamming signals to each jammer, encrypte by their session keys, respectively. The jammers then start to jam the eavesropper with istribute beamforming. Since the on-line selecte jamming signal is encrypte by the session key, the eavesropper (the insie attacker) cannot obtain it. Please be note that the propose protocol can be implemente with a time-ivie system, by extening the frame structure presente in [6]. As the focus of this paper is to emonstrate the effectiveness of the joint cooperative relaying an jamming an the associate optimal relay role assignment, we will fully evelop the implementation etails an conuct relate overhea stuy in our future work. IV. SECRECY CAPACITY MAXIMIZATION In this section, we will first formulate the secrecy rate of the whole transmission, an present a mixe integer programming problem to maximize the secrecy rate, which relates to the optimal assignment of the roles to caniate noes. Distribute beamforming is utilize in the moel, where each relay noe an jammer noe apply a weight to the signal transmitte. With proper selection of the weights, the receive signal at a certain noe can be nulle out to achieve jamming through istribute beamforming. A. Secrecy Rate Formulation As inicate before, to improve the secrecy rate of the whole transmission, a two-phase transmission between the source an the estination is establishe. Each caniate noe can be regare as a relay or a jammer. We present an optimal relay an jammer selection to maximize the secrecy rate. Denote the set of all the caniate noes N = {, 2,,..., N}. For each caniate noe, we set two parameters to inicate its role as a relay or jammer. The specifical escription can be expresse as { relay if x i = an u i =0, n i = jammer if x i = 0 an u i =, where n i is the ith caniate noe (i =,..., N), the value of x i an u i can be 0 or, an x i + u i =. Accoring to the efinition, for convenience of escription an explicit physical meaning, we enote the roles of all N caniate noes by two vectors x =[x,x 2,..., x N ] T an u = [u,u 2,..., u N ] T. Therefore, we can obtain the role of the ith caniate noe by the values of x i an u i, which are relative to the secrecy rate maximization problem. ) The first transmitting phase: The source broacasts the message, S, an certainly the eavesropper can hear the message. To isturb the eavesropping, the jammers at the same time sen the jamming signals, Z, by istribute beamforming without affecting the estination. For the caniate noes acting as relays, the values corresponing to them in vector x must be, an the values corresponing to the caniate noes acting as jammers in vector u must be. In this phase, the receive signals at the caniate noes, the estination an the eavesropper can be written as y N = P s h T sn S + n N, () y () = P s h s S + n (), (2) y e () = P s h se S + P u T W h Ne Z + n () e, (3) respectively, where P s is the transmit power of the source, P is the total transmit power of the caniate noes in the first phase, W = iag([w (), w() 2,..., w() N ]) is a N N power allocation weight matrix of the caniate noes in the first phase, w T w = where w =[w (), w() 2,..., w() N ]T, n N is the AWGN at the caniate noes, n () is the AWGN at the estination an n () e is the AWGN at the eavesropper. The receive SNRs at the estination an the eavesropper in the first phase can be escribe as γ () = P s h s 2 σ 2, (4) γ e () P s h se 2 = P u T W h Ne 2 + σ 2, (5) respectively. 2) The secon transmitting phase: The relays utilize istribute beamforming to forwar the weighte message to the estination while the jammers continue sening jamming signals to interfere the eavesropper without impacting the estination. In this phase, the receive signals at the estination an the eavesropper can be written as y (2) = P 2 x T W 2 h N S + n (2), (6) y e (2) = P 2 x T W 2 h Ne S + P 2 u T W 2 h Ne Z + n (2) e, (7) respectively, where P 2 is the total transmit power of the caniate noes in the secon phase, W 2 = iag([w (2), w(2) 2,..., w(2) N ]) is a N N power allocation weight matrix of the caniate noes in the secon phase, w2 T w 2 = where w 2 =[w (2), w(2) 2,..., w(2) N ]T, n (2) is the AWGN at the estination an n (2) e is the AWGN at the eavesropper. 4450
4 The receive SNRs at the estination an the eavesropper in the secon phase can be escribe as γ (2) = P 2 x T W 2 h N 2 σ 2, (8) γ e (2) = P 2 x T W 2 h Ne 2 P 2 u T W 2 h Ne 2 + σ 2, (9) respectively. In the secon phase, when the esire message sent by the relays can be completely nulle out at the eavesropper by using cooperative beamforming at the relays, i.e., x T W 2 h Ne =0, the eavesropper can wiretap nothing about the esire message, then the jamming is not necessary. We combine the signals from the first an secon phases aopting maximal ratio combining (MRC) metho [8], an the receive SNRs at the estination an the eavesropper in the whole transmission can be escribe as γ = γ () + γ (2) = P s h s 2 σ 2 + P 2 x T W 2 h N 2 σ 2, (0) γ e = γ e () + γ e (2) P s h se 2 = P u T W h Ne 2 + σ 2 + P 2 x T W 2 h Ne 2 P 2 u T W 2 h Ne 2 + σ 2, () respectively. When x T W 2 h Ne =0, the secon part of the above equation is zero, i.e., γ e (2) =0. The corresponing maximum information rates at the estination an the eavesropper are R = 2 log 2( + γ )=log 2 ( + γ () + γ (2) ), (2) R e = 2 log 2( + γ e )=log 2 ( + γ () e + γ (2) e ), (3) respectively, where the factor /2 is ue to the fact that the two phases share the transmission time. Therefore, the secrecy rate of the whole transmission can be written as SC = {R R e } + = 2 {log 2 ( + γ ) log 2 ( + γ e )} +. (4) B. Maximization Problem From the above iscussion, we can see that changing the number of relays an jammers will impact the secrecy rate, i.e., ifferent values of the vectors x an u influence the security of the transmission. Thus, a mixe integer programming problem for secrecy rate maximization with the optimal values of the vectors x an u is presente. In the first transmitting phase, istribute beamforming is aopte at the jammers to avoi the interference at the relays an the estination while confusing the eavesropper. Thus, there are two null space constraints in this phase, i.e., u T W H N X = 0 N an u T W h N = 0, where X = iag([x, x 2,..., x N ]). The necessary conition for the null space constraints in this phase is that the number of jammers is larger than that of relays an estination, i.e., N J >N R +, where N J an N R are the numbers of jammers an relays, respectively. Otherwise, if N J N R +, we cannot avoi interference cause by the jammers at the relays an the estination completely. If cooperative beamforming at the relays oes not work well in the secon transmitting phase, the jammers interfere the eavesropper without affecting the estination, that is, u T W 2 h N =0an N J >. When null space cooperative beamforming employe at the relays can completely null out the esire message at the eavesropper, then x T W 2 h Ne =0 an N R >. Our objective is to select optimal relays an jammers with power allocation to maximize the secrecy rate subject to a total transmit power constraint. Depening on whether x T W 2 h Ne is zero or not, we can formulate the secrecy rate maximization problem as following. ) x T W 2 h Ne 0 (without nulling out): The esire message sent by the relays cannot be completely nulle out at the eavesropper in the secon phase. Uner the null space constraints in the first phase, the optimization problem for maximum secrecy rate can be formulate as follows. arg max SC =arg max {R R e } =arg max 2 {log 2 ( + γ ) log 2 ( + γ e )}, (5) subject to P s + P + P 2 = P 0, (5a) u T W h N =0, (5b) u T W 2 h N =0, (5c) u T W H N X = 0 N, (5) where P 0 is the total transmit power constraint. It is obviously a mixe integer programming problem. Specifically, when SNR, the objective function can be expresse as arg max 2 {log 2 ( + γ ) log 2 ( + γ e )} arg max P s h s 2 σ + P2 xt W 2h N 2 2 σ 2 P s h se 2 P u T W h Ne + P2 xt W 2h Ne 2 2 +σ 2 P 2 u T W 2h Ne 2 +σ 2. (6) 2) x T W 2 h Ne =0(nulling out): The esire message sent by the relays can be completely nulle out at the eavesropper in the secon phase. In this case, the secrecy rate maximization problem can be formulate as follows. arg max SC =arg max 2 {log 2 ( + γ ) log 2 ( + γ e )}, (7) subject to P s + P + P 2 = P 0, (7a) u T W h N =0, (7b) x T W 2 h Ne =0, (7c) u T W H N X = 0 N. (7) 445
5 propose scheme 0.2 DF scheme CJ scheme Source-eavesropper Distance (m) Fig. 2. Scenario use for numerical experiments. Fig. 3. Secrecy rate versus source-eavesropper istance. Similarly, when SNR, the objective function will be arg max 2 {log 2 ( + γ ) log 2 ( + γ e )} arg max =arg max P s h s 2 σ + P2 xt W 2h N 2 2 σ 2 P s h se 2 P u T W h Ne 2 +σ 2 (P s h s 2 + P 2 x T W 2 h N 2 ) P u T W h Ne 2 + σ 2 P s h se 2. (8) We can see that the secrecy rate maximization problem is a mixe integer programming problem, which is NP-har in general. In this paper, our focus is to emonstrate the efficiency of the propose joint relaying an jamming an the optimal relay assignment, an we use exhaustive search to solve the problem which is an easy approach to obtain the solution when the network scale is small, while it becomes ifficult for a large network scale. Therefore, in the future work, we will stuy how to evelop efficient approximate algorithms to solve this mixe integer programming problem when the network scale gets larger, such as the branch-an-boun an cutting plane methos. V. NUMERICAL RESULTS In this section, numerical results are provie to emonstrate the performance of our propose scheme. In our simulation, the path-loss exponent of wireless channels is β =3 an the aitive white Gaussian noise power is σ 2 =mw. In aition, we set the total transmit power constraint, P 0 = 000 mw. The 2D square topology of the scenario is shown as in Fig. 2, where there is a source, a estination, an eavesropper an several ranomly istribute caniate noes whose center is at (0, 0). To emonstrate the performance of our propose scheme, two cooperative schemes, ecoe-an-forwar (DF) scheme an cooperative jamming (CJ) scheme mentione in [2] have been involve. The relays transmit a weighte version of a reencoe noise-free message signal for the DF scheme while the relays transmit a jamming signal for the CJ scheme. Accoring to our assumption that all caniate noes can properly ecoe the signals from the source, we can assign a fixe large value of P s = 200 mw to satisfy the assumption, an thus our establishe moel is applie to solve the power allocation an weight factors for the relays an jammers. In aition, the number of caniate noes is N =6. As in Fig. 2, the eavesropper location is first fixe at (0, 5). When move the position of the eavesropper from (5, 5) to (5, 5), we can obtain the relationship between the secrecy rate of the whole transmission an the istance from the eavesropper to the source. From Fig. 3, when the istance between the eavesropper an the source becomes larger, the secrecy rates for the DF scheme, the CJ scheme an our propose scheme first increase an then ecrease. The secrecy rates for all three schemes increase since the receive signal power at the eavesropper ecreases when the eavesropper moves away from the source, while when the istance between the eavesropper an the source continues to increase, the secrecy rate ecreases since the eavesropper approaches the estination, which has a negative impact on the secrecy rate. Furthermore, the secrecy rate for the CJ scheme is much lower than the other two schemes, since the CJ scheme can only ecrease the rate at the eavesropper but it cannot improve the rate at the estination. Fig. 4 shows the secrecy rate for ifferent numbers of caniate noes. The eavesropper location is fixe at (0, 5). From the figure, with the number of caniate noes increasing, the secrecy rate of the whole transmission for each scheme becomes larger, which inicates that increasing the number of caniate noes improves the secrecy rate. However, when the number of caniate noes continues to increase, the secrecy rates for three schemes increase slowly an are almost saturate, which shows that there is a limitation for improving the secrecy rate through increasing the number of caniate noes. In aition, the secrecy rate for the CJ scheme is also much lower than the other two schemes which is limite by the istance between the source an the estination. Furthermore, the secrecy rate for our scheme has a better performance than the other two schemes since we consier the optimal selection of relays an jammers to simultaneously enhance the rate at the estination an reuce the rate at the eavesropper. VI. CONCLUSION In this paper, a joint cooperative relaying an jamming scheme has been presente to enhance the secrecy rate of a 4452
6 Fig. 4. propose scheme DF scheme CJ scheme Number of Caniate Noes Secrecy rate versus number of caniate noes. wireless channel in the presence of an eavesropper, which is an insie attacker. We have propose to assign some relay noes to act as jammers while the rest continue relaying information to the estination. A mixe integer programming problem for maximum secrecy rate has been formulate. Furthermore, our scheme also consiers some special challenges, such as ealing with both the impact of the insie attacker an the phase an frequency synchronization in istribute beamforming. Numerical results have emonstrate the merits of our scheme in terms of secrecy rate, with comparison to DF an CJ schemes. [0] L. Dong, Z. Han, A.P. Petropulu an H.V. Poor, Cooperative jamming for wireless physical layer security, in 2009 IEEE SSP Workshops, Sept. 2009, pp [] R. Zhang, L. Song, Z. Han an B. Jiao, Physical layer security for twoway untruste relaying with frienly jammers, IEEE Trans. Vehicular Tech., vol. 6, no. 8, pp , Oct [2] L. Dong, Z. Han, A.P. Petropulu an H.V. Poor, Improving wireless physical layer security via cooperating relays, in IEEE Trans. Signal Process., vol. 58, no. 3, pp , Mar [3] H.-M. Wang, M. Luo an Q. Yin, Hybri cooperative relaying an jamming for secure two-way relay networks, in Proc. IEEE GLOBECOM, Dec. 202, pp [4] J. Chen, R. Zhang, L. Song, Z. Han an B. Jiao, Joint relay an jammer selection for secure two-way relay networks, IEEE Trans. Inf. Forensics an Security, vol. 7, no., pp , Feb [5] Hong L., M. McNeal an C. Wei, Secure cooperative MIMO communications uner active compromise noes, 20 IEEE Int l. Pervasive Computing an Commun. Workshops (PERCOM Workshops), Mar 20, pp [6] R. Muumbai, G. Barriac an U. Mahow, On the feasibility of istribute beamforming in wireless networks, IEEE Trans. Wireless Commun., vol. 6, no. 5, pp , May [7] R. Liu an W. Trappe, Securing Wireless Communications at the Physical Layer, Springer, [8] T. S. Rappaport, Wireless Communications Principles an Practice, 2n e. Prentice Hall, ACKNOWLEDGMENT This work was supporte in part by the National Natural Science Founation of China (Grant No ), the Science Technology Innovation Founation for Young Teachers in BUPT (Grant No. 203RC0202), the State Major Science an Technology Special Projects (Grant No. 202ZX ), an the Beijing Higher Eucation Young Elite Teacher Project (Grant No. YETP0442). REFERENCES [] A. D. Wyner, The wire-tap channel, Bell Syst. Tech. J., vol. 54, no. 8, pp , Oct [2] S. K. Leung-Yan-Cheong an M. E. Hellman, The Gaussian wire-tap channel, IEEE Trans. Inf. Theory, vol. 24, no. 4, pp , Jul [3] I. Csiszar an J. Korner, Broacast channels with confiential messages, IEEE Trans. Inf. Theory, vol. 24, no. 3, pp , May 978. [4] Q. Guan, F.R. Yu an S. Jiang, Capacity-optimize topology control for MANETs with cooperative communications, IEEE Trans. Wireless Commun., vol. 0, no. 7, pp , Jul. 20. [5] D.W.K. Ng, E.S. Lo an R. Schober, Energy-efficient resource allocation in multi-cell OFDMA systems with limite backhaul capacity, IEEE Trans. Wireless Commun., vol., no. 0, pp , Oct [6] J. Kim, A. Ikhlef an R. Schober, Combine relay selection an cooperative beamforming for physical layer security, J. Commun. Netw., vol. 4, no. 4, pp , Aug [7] Y. Liu an W. Nie, Selection base cooperative beamforming an power allocation for relay networks, J. Commun. Netw., vol. 3, no. 4, pp , Aug. 20. [8] Y. Yang, Q. Li, W.-K. Ma, J. Ge an P. C. Ching, Cooperative secure beamforming for AF relay networks with multiple eavesroppers, IEEE Signal Process. Lett., vol. 20, no., pp , Jan [9] J. Yang, I. Kim an D. I. Kim, Optimal cooperative jamming for multiuser broacast channel with multiple eavesroppers, IEEE Trans. Wireless Commun., vol. 2, no. 6, pp , Jun
SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS
SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS Xiaohua Li 1 1 Department of ECE State University of New York at Binghamton Binghamton, NY 139, USA {xli,jhwu1}@binghamton.eu
More informationResource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users
Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users D. Richar Brown III Electrical an Computer Engineering Department Worcester Polytechnic Institute Worcester,
More informationCapacity Gain from Transmitter and Receiver Cooperation
Capacity Gain from Transmitter an Receiver Cooperation Chris T. K. Ng an Anrea J. Golsmith Dept. of Electrical Engineering Stanfor University, Stanfor, CA 90 Email: ngctk, anrea}@wsl.stanfor.eu arxiv:cs/00800v1
More informationDynamic Hybrid Duplex for Rate Maximization in OFDMA. Sangmin Oh and Chae Y. Lee
Dynamic Hybri Duplex for Rate Maximization in OFDMA Sangmin Oh an Chae Y. Lee Dept. of Inustrial Engineering, KAIST, 373-1 Kusung Dong, Taeon, Korea Tel: +82-42-350-5916, FAX: +82-42-350-3110 Email: {sangmin.oh,
More informationROC Analysis of BLM Detector in AF Relays Based Cooperative Wireless Networks Omar GATERA 1, Ahmet Hamdi KAYRAN 1 and Haci ILHAN 2
6 International Conference on Sustainable Energy, Environment an Information Engineering (SEEIE 6) ISBN: 978--6595-337-3 ROC Analys of BLM Detector in AF Relays Base Cooperative Wireless Networks Omar
More informationJoint Partial Relay Selection, Power Allocation and Cooperative Maximum Likelihood Detection for MIMO Relay Systems with Limited Feedback
Joint Partial Relay Selection, Power Allocation an Cooperative Maximum Likelihoo Detection for MIMO Relay Systems with Limite Feeback Thomas Hesketh, Rorigo C. e Lamare, Stephen Wales Department of Electronics,
More informationIN GENERAL, an optical network can consist of a
1 Geometric Capacity Provisioning for Wavelength-Switche WDM Networks Li-Wei Chen, Eytan Moiano Abstract In this paper, we use an asymptotic analysis similar to the sphere-packing argument in the proof
More informationPerformance Analysis and Comparison of ZF and MRT Based Downlink Massive MIMO Systems
Performance Analysis an Comparison of ZF an MRT Base Downlink Massive MIMO Systems Tebe Parfait, Yujun uang, 1,2 ponyo Jerry 1 Mobilelink Lab Univ of Electronic Sci an Tech of China, UESTC Chengu, China
More informationEnergy Efficient Relay Selection for Cooperative Relaying in Wireless Multimedia Networks
Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimeia Networks Zhengguo Sheng, Jun Fan, Chi Harol Liu, Victor C. M. Leung, Xue Liu*, an Kin K. Leung Orange Labs, France Telecom,
More informationTopology-assisted techniques to relay selection for homogeneously distributed wireless sensor networks
This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceeings. Topology-assiste techniques to relay selection
More informationCross-layer Routing Optimization for Wireless Networks with Cooperative Diversity
Cross-layer Routing Optimiation for Wireless Networs with Cooperative Diversity Zhiguo Ding an Kin K. Leung Department of Electrical an Electronic Engineering Imperial College Lonon, UK. Email: {higuo.ing,
More informationWireless Powered Dual-Hop Multiple Antenna Relay Transmission in the Presence of Interference
EEE CC 05 - Wireless Communications Symposium Wireless Powere Dual-Hop Multiple Antenna Relay Transmission in the Presence of nterference Guangxu Zhu, Caijun Zhong, Himal A. Suraweera, George K. Karagianniis,
More informationQoS Topology Control in Ad Hoc Wireless Networks
QoS Topology Control in A Hoc Wireless Networks Xiaohua Jia, Deying Li Dept of Computer Science City University of Hong Kong Hong Kong, China Dingzhu Du Dept of Computer Science an Engineering University
More informationEnergy Efficient Virtual MIMO-based Cooperative Communications for Wireless Sensor Networks
Energy Efficient Virtual MIMO-base Cooperative Communications for Wireless Sensor Networks Suharman K. Jayaweera Department of Electrical an Computer Engineering Wichita State University, Wichita, KS,
More informationA General Algorithm for Interference Alignment and Cancellation in Wireless Networks
A General Algorithm for Interference Alignment an Cancellation in Wireless Networks Li Erran Li, Richar Alimi, Dawei Shen, Harish Viswanathan an Y. Richar Yang Bell Labs MIT Yale University Abstract Physical
More informationCache-Aided Content Delivery in Fog-RAN Systems with Topological Information and no CSI
Cache-Aie Content Delivery in Fog-RAN Systems with Topological Information an no CSI Wei-Ting Chang, Ravi Tanon, Osvalo Simeone Abstract In this work, we consier a Fog Raio Access Network (F-RAN) system
More informationPage 1. Overview : Wireless Networks Lecture 7: Cellular Networks. The advent of cellular networks. The cellular network design.
Overview 18-759: Wireless Networks Lecture 7: Cellular Networks Dina Papagiannaki & Peter Steenkiste Departments of Computer Science an Electrical an Computer Engineering Spring Semester 2009 http://www.cs.cmu.eu/~prs/wireless09/
More informationSecure Communication with a Wireless-Powered Friendly Jammer
Secure Communication with a Wireless-Powere Frienly Jammer Wanchun Liu, Xiangyun Zhou, Salman Durrani, an Petar Popovski arxiv:42.0349v2 [cs.it] 26 Aug 205 Abstract In this paper, we propose to use a wireless-powere
More informationRelay Deployment and Power Control for Lifetime Elongation in Sensor Networks
Relay Deployment an Power Control for Lifetime Elongation in Sensor Networks Yufeng Xin, Tuna Güven, Mark Shayman Institute of Avance Computer Stuies University of Marylan, College Park, MD 074 e-mail:
More informationIndoor Wireless Planning using Smart Antennas
Inoor Wireless Planning using Smart Antennas Ali Abbasi an Maji Ghaeri Department of Computer Science, University of Calgary Emails: {abbasi, mghaeri}@ucalgary.ca Abstract This paper consiers the problem
More informationShadowing Correlation Model for Indoor Multi-hop Radio Link in Office Environment
JAVA, International Journal of Electrical Electronics Engineering Volume 4, Number, April 26 Shaowing Moel for Inoor Multi-hop Raio Link in Office Environment Mohamma Fahli Inustrial Engineering Department
More informationSUBSET: A Joint Design of Channel Selection and Channel Hopping for Fast Blind Rendezvous in Cognitive Radio Ad Hoc Networks
SUBSET: A Joint esign of Channel Selection an Channel Hopping for Fast Blin enezvous in Cognitive aio A Hoc Networks Xingya Liu an Jiang Xie epartment of Electrical an Computer Engineering The University
More informationThe effect of two realistic Radio Propagation Models for Mobile Ad hoc NETworks in Urban Area Environment Supported with stations
International Journal of Scientific & Engineering Research Volume 2, Issue 1, Oct-211 1 The effect of two realistic Raio Propagation Moels for Mobile A hoc NETworks in Urban Area Environment Supporte with
More informationAn Analysis of Reliable MAC Layer Multicast in Wireless Networks
An Analysis of Reliable MAC Layer Multicast in Wireless etworks Yoooc Song, Junho Chung, Wookyung Sung, Bosung Kim, Dowon Hyun an Juwook Jang Department of lectronic ngineering, Sogang University. mail:
More informationIndoor Positioning Using Ultrasound and Radio Combination
Inoor Positioning Using Ultrasoun an Raio Combination Gintautas Salcius, Evalas Povilaitis, Algimantas Tacilauskas Centre of Real Time Computer Systems, Kaunas University of Technology Stuentu St. 50,
More informationPerformance of Amplify-and-Forward Relaying with Wireless Power Transfer over Dissimilar Channels
http://x.oi.org/.5755/ j.eee..5.333 ELEKTRONIKA IR ELEKTROTECHNIKA ISSN 39-5 VOL. NO. 5 5 Performance of Amplify-an-Forwar Relaying with Wireless Power Transfer over Dissimilar Channels Dac-Binh Ha Duc-Dung
More informationAN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS
AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS Davi B. Smith (1) (1) Faculty of Engineering (Telecommunications), University of Technology Syney PO Box 13 Broaway NS 007 Australia E-mail:
More informationWireless Event-driven Networked Predictive Control Over Internet
UKACC International Conference on Control 22 Cariff, UK, 3-5 September 22 Wireless Event-riven Networke Preictive Control Over Internet Wenshan Hu, Hong Zhou, an Qijun Deng Abstract In networke control
More informationConstruction of Power Efficient Routing Tree for Ad Hoc Wireless Networks using Directional Antenna
Construction of Power Efficient Routing Tree for A Hoc Wireless Networks using Directional Antenna Qing Dai an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,
More informationEXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT
EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT Timothy W. McLain Ranal W. Bear Je M. Kelsey Department of Mechanical Engineering, Brigham Young University, Provo, Utah 86 Department
More informationBalanced-energy Sleep Scheduling Scheme for High Density Cluster-based Sensor Networks
Balance-energy Sleep Scheuling Scheme for High Density Cluster-base Sensor Networks Jing Deng, unghsiang S. Han, Weni B. Heinzelman, an Pramo K. Varshney Abstract In orer to conserve battery power in very
More informationMODELLING OF GPS SIGNAL LARGE SCALE PROPAGATION CHARACTERISTICS IN URBAN AREAS FOR PRECISE NAVIGATION
Int. J. Elec&Electr.Eng&Telcomm. 2012 G Sateesh Kumar et al., 2012 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 1, No. 1, October 2012 2012 IJEETC. All Rights Reserve MODELLING OF GPS SIGNAL LARGE
More informationEffect of Carrier Frequency Offset on the BER Performance of Variable Spreading Factor OFCDM Systems
This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the ICC 008 proceeings. Effect of Carrier Frequency Offset on the erformance
More informationMinimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues
Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan
More informationPower Efficient Pilot Symbol Power Allocation under Time-variant Channels
Power Efficient Pilot Symbol Power Allocation uner Time-variant Channels Michal Šimko, Paulo S. R. Diniz,QiWang an Markus Rupp Institute of Telecommunications, Vienna University of Technology, Vienna,
More informationDouble Closed-loop Control System Design of PMSM Based on DSP MoupengTao1, a,songjianguo2, b, SongQiang3, c
4th International Conference on Mechatronics, Materials, Chemistry an Computer Engineering (ICMMCCE 2015) Double Close-loop Control System Design of PMSM Base on DSP MoupengTao1, a,songjianguo2, b, SongQiang3,
More informationAN-1140 APPLICATION NOTE
APPLICATION NOTE One Technology Way P.O. Box 9106 Norwoo, MA 02062-9106, U.S.A. Tel: 781.329.4700 Fax: 781.461.3113 www.analog.com Microphone Array Beamforming by Jera Lewis INTRODUCTION All MEMS microphones
More informationJitter Limitations on a Gigabit Copper Multi- Carrier System
Jitter Limitations on a Gigabit Copper Multi- Carrier System Jan H. Rutger Schraer, Eric A.M. Klumperink, Jan L. Visschers, Bram Nauta University of Twente, IC-Design Group, P.O. Box 7, 75 AE, Enschee,
More informationIndoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information Map
Inoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information Map Ahma Abbou 1, Ali H. Jaber Department of Statistics ebanese University Nabatieh, ebanon 1 Ahma.Abbou@etu.unilim.fr, ali.jaber@ul.eu.lb
More informationReplanning of Optical Networks based on Defragmentation Techniques
Replanning of Optical Networks base on Defragmentation Techniques Daniela Aguiar Moniz aniela.moniz@tecnico.ulisboa.pt Instituto Superior Técnico, Lisboa, Portugal November 2015 Abstract The traffic growth
More informationTransit Network Design under Stochastic Demand
Transit Network Design uner Stochastic Deman Hong K. LO Civil an Environmental Engineering Hong Kong University of Science an Technology 1 Public transport Backgroun Fixe route transit (FRT) : fixe route
More informationImplementation of Beam Formation for WMNs
Implementation of Beam Formation for WMNs M. UTHANSAKUL, S. PRADITTARA AND P. UTHANSAKUL School of Telecommunication Engineering Suranaree University of Technology 111 University Avenue, Muang, Nakhonratchasima
More informationPrincipal Component Analysis-Based Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing
Principal Component Analysis-Base Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing Xin He 1, Yashwant Malaiya 2, Anura P. Jayasumana 1 Kenneth P. Parker 3 an Stephen Hir
More informationBreaking the Interference Barrier in Dense Wireless Networks with Interference Alignment
Breaking the Interference Barrier in Dense Wireless Networks with Interference Alignment Konstantinos Dovelos an Boris Bellalta Universitat Pompeu Fabra (UPF, Barcelona Abstract arxiv:1710.11458v2 [cs.ni]
More informationProbabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA
Probabilistic Hanshake in All-to-all Broacast Coe Slotte ALOHA Mikhail Ivanov, Petar Popovski, Frerik Brännström, Alexanre Graell i Amat, an Čeomir Stefanović Department of Signals an Systems, Chalmers
More informationOn the performance of truncated type III hybrid ARQ scheme with code combining
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2003; 3:641 658 (DOI: 10.1002/wcm.147) On the performance of truncate type III hybri ARQ scheme with coe combining Qingchun Chen*,y
More informationRECENTLY, the 2G standard GSM was enhanced by
274 IEEE TRANSACTIONS ON WIREESS COMMUNICATIONS, VO. 5, NO. 2, FEBRUARY 2006 The Training Sequence Coe Depenence of EDGE Receivers using Zero IF Sampling Martin Krueger, Member, IEEE, Robert Denk, an Bin
More informationThe use of Facts devices in disturbed Power Systems-Modeling, Interface, and Case Study
nternational Journal of Computer an Electrical Engineering, ol., No., April 009 793-898 The use of Facts evices in isturbe Power Systems-Moeling, nterface, an Case Stuy Salim. Haa, A. Haouche, an H. ouyea
More informationGeneralized Signal Alignment For MIMO Two-Way X Relay Channels
Generalized Signal Alignment For IO Two-Way X Relay Channels Kangqi Liu, eixia Tao, Zhengzheng Xiang and Xin Long Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China Emails:
More informationOn the Performance of Cooperative Routing in Wireless Networks
1 On the Performance of Cooperative Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca
More informationarxiv: v2 [nlin.ao] 24 May 2012
arxiv:205.2952v2 [nlin.ao] 24 May 202 Synchronization an quorum sensing in a swarm of humanoi robots Patrick Bechon, Jean-Jacques Slotine Abstract With the avent of inexpensive simple humanoi robots, new
More informationThe Analysis and Complementarity of Abbe Principle Application Limited in Coordinate Measurement
Proceeings of the Worl Congress on Engineering 00 Vol III The Analysis an Complementarity of Abbe Principle Application Limite in Coorinate Measurement Fei Yetai, Shang Ping, Chen Xiaohuai, Huang Qiangxian
More informationDETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING
DETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING Zelko Popovic Distribution engineer Rae Koncara 57, 24300 Backa Topola, Yugoslavia Phone: +38 24 74 220 Fax: +38 24 74 898
More informationUneven Clustering Routing Algorithm Based on Optimal Clustering for Wireless Sensor Networks
Journal of Communications Vol. 11, No., February 016 Uneven Clustering Routing Algorithm Base on Optimal Clustering for Wireless Sensor Networks Jianpo Li an Junyuan Huo School of Information Engineering,
More informationSlow Beam Steering for Indoor Multi-User Visible Light Communications
Slow Beam Steering for Inoor Multi-User Visible Light Communications Yusuf Sai Eroğlu, Chethan Kumar Anjinappa, İsmail Güvenç, an Nezih Pala Department of Electrical an Computer Engineering, North Carolina
More informationKURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017
Jurnal Ilmiah KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017 ISSN 0216 0544 e-issn 2301 6914 OPTIMAL RELAY DESIGN OF ZERO FORCING EQUALIZATION FOR MIMO MULTI WIRELESS RELAYING NETWORKS
More informationRelay Selection in Adaptive Buffer-Aided Space-Time Coding with TAS for Cooperative Wireless Networks
Asian Journal of Engineering and Applied Technology ISSN: 2249-068X Vol. 6 No. 1, 2017, pp.29-33 The Research Publication, www.trp.org.in Relay Selection in Adaptive Buffer-Aided Space-Time Coding with
More informationOn Time-of-Arrival Estimation in NB-IoT Systems
On Time-of-Arrival Estimation in NB-IoT Systems Sha Hu, Xuhong Li, an Frerik Rusek Department of Electrical an Information Technology, Lun University, Lun, Sween {firstname.lastname}@eit.lth.se arxiv:7.383v
More informationA new method of converter transformer protection without commutation failure
IOP Conference Series: Earth an Environmental Science PAPER OPEN ACCESS A new metho of converter transformer protection without commutation failure To cite this article: Jiayu Zhang et al 08 IOP Conf.
More informationTHe notion of the disease [1] has been extended from
IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 Effective Network Quarantine with Minimal Restrictions on Communication Activities uanyang Zheng an Jie Wu, Fellow, IEEE Abstract
More informationORTHOGONAL frequency division multiple access
ITL JOURAL OF ELECTROICS AD TELECOMMUICATIOS, 01, VOL. 58, O. 3, PP. 61 66 Manuscript receive December 18, 011; revise February, 01. DOI: 10.478/v10177-01-0036-0 Timing Synchronization an Frequency Offset
More informationEasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network
EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and
More informationMeasurement of Semi-Anechoic Chamber Using Modified VSWR method above 1GHz
Measurement of Semi-Anechoic Chamber Using Moifie VSWR metho above 1GHz M. Bittera, K. Kováč, J. Hallon Department of Measurement, Faculty of Electrical Engineering an Information Technology, Slovak University
More informationHOW SYMMETRICAL COMPONENTS MAY HELP TO SUPPRESS VOLTAGE SENSORS IN DIRECTIONAL RELAYS FOR DISTRIBUTION NETWORKS
C E D 17 th nternational Conference on Electricity Distribution Barcelona, 12-15 May 2003 HOW SYMMETCAL COMPONENTS MAY HELP TO SUPPESS VOLTAGE SENSOS N DECTONAL ELAYS FO DSTBUTON NETWOKS Xavier LE PVET
More informationNew M-ary QAM Transmission Payload System
r AIAA ICSSC-005 New M-ary QAM Transmission Payloa System Masayoshi TANAKA * Nihon University, College of Inustrial Technology, --, Izumicho, Narashino, 75-8575, Japan This paper presents a new M-ary moulation
More informationRCGA based PID controller with feedforward control for a heat exchanger system
Journal of the Korean Society of Marine Engineering, Vol. 1, No. pp. 11~17, 17 ISSN 223-7925 (Print) J. Korean Soc. of Marine Engineering (JKOSME) ISSN 223-8352 (Online) https://oi.org/.5916/jkosme.17.1..11
More informationRadio Range Adjustment for Energy Efficient Wireless Sensor Networks. Electronic Engineering, Aston University, Birmingham B4 7ET,United Kingdom b
Raio Range Ajustment for Energy Efficient Wireless Sensor Networks Q. Gao a,, K. J. Blow a 1, D. J. Holing a, I. W. Marshall b, X. H. Peng a a Electronic Engineering, Aston University, Birmingham B4 7ET,Unite
More informationPerformance Comparison of the Differential Evolution and Particle Swarm Optimization Algorithms in Free-Space Optical Communications Systems
[Downloae from www.aece.ro on Tuesay August 18 015 at 1:7:15 (UTC) by 194.7.9.5. Reistribution subect to AECE license or copyright.] Avances in Electrical an Computer Engineering Volume 15 Number 015 erformance
More informationAcoustical Localization in Schools of Submersibles
Oceans 6, Singapore (authors manuscript o not istribute) Acoustical Localization in Schools of Submersibles Navina Kottege & Uwe R. Zimmer Research School of Information Sciences an Engineering Autonomous
More informationAnalog Input. Current
A Continuous-Time Switche- Moulator with Reuce Loop Delay Louis Luh John Choma,Jr. Jerey Draper Electrical Engineering Information Sciences Institute University of Southern California University of Southern
More informationA Primary User Emulation Attack Countermeasure Strategy and Energy-Efficiency Analysis in Cognitive Radio Networks
Journal o Communications Vol., No., January 7 A imary User Emulation Attack Countermeasure Strategy an Energy-Eiciency Analysis in Cognitive Raio Networks unchuan Wang, Xiaorong Xu, Weiwei Wu, an Jianrong
More informationCode-Carrier Divergence Monitoring for the GPS Local Area Augmentation System
Coe-Carrier Divergence Monitoring for the GPS Local Area Augmentation System Dwaraanath V. Simili an Boris Pervan, Illinois Institute of Technology, Chicago, IL Abstract Coe-carrier smoothing is a commonly
More informationTeaching Control Using NI Starter Kit Robot
UKACC International Conference on Control 2012 Cariff, UK, 3-5 September 2012 Teaching Control Using NI Starter Kit Robot Payman Shakouri, Member IEEE, (Research stuent) Gorana Collier, Member IEEE, Anrzej
More informationChapter 2 Review of the PWM Control Circuits for Power Converters
Chapter 2 Review of the PWM Control Circuits for Power Converters 2. Voltage-Moe Control Circuit for Power Converters Power converters are electrical control circuits that transfer energy from a DC voltage
More informationINTERFERENCE REJECTION PERFORMANCE AS A MEANS OF FREQUENCY OPTIMISATION IN A MIXED CELLULAR/MANET NETWORK
ITERFERECE REJECTIO PERFORMACE A A MEA OF FREQUECY OPTIMIATIO I A MIXED CELLULAR/MAET ETORK Kayonne ebley Faculty Avisor: Dr. Richar Dean Department of Electrical an Computer Engineering Morgan tate University
More informationFASTER-THAN-NYQUIST SPATIOTEMPORAL SYMBOL-LEVEL PRECODING IN THE DOWNLINK OF MULTIUSER MISO CHANNELS
FASTER-THAN-NYQUIST SPATIOTEMPORAL SYMBOL-LEVEL PRECODING IN THE DOWNLINK OF MULTIUSER MISO CHANNELS Maha Aloeh, Danilo Spano, Symeon Chatzinotas, an Björn Ottersten Interisciplinary Centre for Security
More informationA model for mobility-dependent large-scale. propagation characteristics of wireless channel. D. Moltchanov, Y. Koucheryavy, J.
A moel for mobility-epenent large-scale propagation characteristics of wireless channels D. Moltchanov, Y. Koucheryavy, J. Harju Abstract In this paper we propose an extension to existing Markovian wireless
More informationWe are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors
We are IntechOpen, the worl s leaing publisher of Open Access books Built by scientists, for scientists 3,500 108,000 1.7 M Open access books available International authors an eitors Downloas Our authors
More informationUsing Chaos to Detect IIR and FIR Filters
PIERS ONLINE, VOL. 6, NO., 00 90 Using Chaos to Detect IIR an FIR Filters T. L. Carroll US Naval Research Lab, Coe 66, Washington, DC 07, USA Abstract In many signal processing applications, IIR an FIR
More informationA Study of Near-Field Direct Antenna Modulation Systems Using Convex Optimization
American Control Conference Marriott Waterfront, Baltimore, MD, USA June 3-July, WeB8.5 A Stuy of Near-Fiel Direct Antenna Moulation Systems Using Convex Optimization Java Lavaei, Ayin Babakhani, Ali Hajimiri
More informationController Design for Cuk Converter Using Model Order Reduction
n International Conference on Power, Control an Embee Systems Controller Design for Cuk Converter Using Moel Orer Reuction Brijesh Kumar Kushwaha an Mr. Aniruha Narain Abstract: Cuk converter contain two
More informationPilot Based Time Delay Estimation for KSP-OFDM Systems in a Multipath Fading Environment
Pilot Base Time Delay Estimation for KSP-OFDM Systems in a Multipath Faing Environment Dieter Van Welen, Freerik Simoens, Heii Steenam an Marc Moeneclaey TELI Department, Ghent University Sint-Pietersnieuwstraat
More informationDynamic Wireless Power Transfer System for Electric Vehicles to Simplify Ground Facilities - Real-time Power Control and Efficiency Maximization -
Worl Electric Vehicle Journal Vol. 8 - ISSN 232-6653 - 26 WEVA Page WEVJ8-5 EVS29 Symposium Montréal, Québec, Canaa, June 9-22, 26 Dynamic Wireless Power Transfer System for Electric Vehicles to Simplify
More informationCooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach
Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Haobing Wang, Lin Gao, Xiaoying Gan, Xinbing Wang, Ekram Hossain 2. Department of Electronic Engineering, Shanghai Jiao
More informationOptimal Energy Harvesting Scheme for Power Beacon-Assisted Wireless-Powered Networks
Indonesian Journal of Electrical Engineering and Computer Science Vol. 7, No. 3, September 2017, pp. 802 808 DOI: 10.11591/ijeecs.v7.i3.pp802-808 802 Optimal Energy Harvesting Scheme for Power Beacon-Assisted
More informationEfficient Binary Corona Training Protocols for Heterogeneous Sensor and Actor Networks
1 Efficient Binary Corona Training Protocols for Heterogeneous Sensor an Actor Networks F. Barsi, A.A. Bertossi, C. Lavault, A. Navarra, S. Olariu, M.C. Pinotti, an V. Ravelomanana Abstract Sensor networks
More informationEnergy Efficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control
11 I Colloquium on Humanities, Science an ngineering Research (CHUSR 11), Dec 5-6 11, Penang nergy fficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control Z.W. Siew, A. Kiring,
More informationDegrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT
Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)
More informationMULTIPATH fading could severely degrade the performance
1986 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 53, NO. 12, DECEMBER 2005 Rate-One Space Time Block Codes With Full Diversity Liang Xian and Huaping Liu, Member, IEEE Abstract Orthogonal space time block
More informationExperimental implementation of an Ultra-Wide Band MIMO radar
Experimental implementation of an Ultra-Wie Ban MIMO raar Ettien Lazare Kpré, Thomas Fromenteze, Cyril Decroze, Davi Carsenat To cite this version: Ettien Lazare Kpré, Thomas Fromenteze, Cyril Decroze,
More informationAbstract Harvesting energy from ambient environment is a new promising solution to free electronic devices from electric
Wireless Communication System with RF-base Energy Harvesting: From Information Theory to Green System Tao Li, Pingyi Fan, Senior Member, IEEE, Khale Ben Letaief, Fellow, IEEE arxiv:1411.6087v1 [cs.it]
More informationModel Reference Adaptive Fuzzy Controller for Permanent Magnet Synchronous Motor
Volume 50, Number 1, 2009 25 Moel Reference Aaptive Fuzzy Controller for Permanent Magnet Synchronous Motor A. MEROUFEL, M. MASSOUM an B. BELABBES Abstract: Conventional control epens on the mathematical
More informationCell-Free Massive MIMO versus Small Cells
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. X, XXX 2017 1 Cell-Free Massive MIMO versus Small Cells Hien Quoc Ngo, Alexei Ashikhmin, Hong Yang, Erik G. Larsson, an Thomas L. Marzetta arxiv:1602.08232v2
More informationPower Allocation for Three-Phase Two-Way Relay Networks with Simultaneous Wireless Information and Power Transfer
Power Allocation for Three-Phase Two-Way Relay Networks with Simultaneous Wireless Information and Power Transfer Shahab Farazi and D. Richard Brown III Worcester Polytechnic Institute 100 Institute Rd,
More informationOn Energy Efficiency Maximization of AF MIMO Relay Systems with Antenna Selection
On Energy Efficiency Maximization of AF MIMO Relay Systems with Antenna Selection (Invited Paper) Xingyu Zhou, Student Member, IEEE, Bo Bai Member, IEEE, Wei Chen Senior Member, IEEE, and Yuxing Han E-mail:
More informationColor image recognition by use of a joint transform correlator of three liquid-crystal televisions
Color image recognition by use of a joint transform correlator of three liqui-crystal televisions Mei-Li Hsieh, Ken Y. Hsu, an Hongchen Zhai We present a joint transform correlator for color image recognition
More informationA Circuit Level Fault Model for Resistive Shorts of MOS Gate Oxide
Circuit Level Fault Moel for esistive Shorts of MOS Gate Oxie Xiang Lu, Zhuo Li, Wangqi Qiu, D. M. H. Walker an Weiping Shi Dept. of Electrical Engineering Texas &M University College Station, TX 77843-34,
More informationErlang Capacity of Multi-class TDMA Systems with Adaptive Modulation and Coding
Downloae from orbittuk on: Oct 2, 218 Erlang Capacity of Multi-class TDMA Systems with Aaptive Moulation an Coing Wang, Hua; Iversen, Villy Bæk Publishe in: Proceeings of IEEE ICC 28 Link to article, DOI:
More informationReliability and Route Diversity in Wireless Networks
2005 Conference on Information Sciences an Sstems, The Johns Hopkins Universit, March 16 18, 2005 Reliabilit an Route Diversit in Wireless Networks Ehsan Khanani, Etan Moiano, Jinane Abounai, Lizhong Zheng
More informationIN RECENT years, wireless multiple-input multiple-output
1936 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 6, NOVEMBER 2004 On Strategies of Multiuser MIMO Transmit Signal Processing Ruly Lai-U Choi, Michel T. Ivrlač, Ross D. Murch, and Wolfgang
More information