Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits
|
|
- Lionel Norton
- 5 years ago
- Views:
Transcription
1 Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: Emai: Abstract There is growing interest in wireess security methods that provide strong or even perfect secrecy by taking advantage of features of the physica propagation channe. In advantage-based methods, high channe quaity in an average or opportunistic sense is expoited between two egitimate nodes, such that nonzero secrecy capacity can be achieved. Since such methods require bounds on the quaity of the eavesdropper channe, they are somewhat impractica. Secret key generation based on tracking channe evoution in time division dupex systems is a more attractive option, where two nodes generate secret key bits based on a mutuay known random channe. Since the eavesdropper channe is typicay independent of the egitimate channe, the key can ony be broken by brute force attacks, which are difficut when new keys are continuousy generated. In this paper, the information theoretic imits of key generation schemes are investigated, based on the eve of estimation error, tempora correation, and dependence of the eavesdropper and egitimate channes. Two practica candidate key generation schemes are aso considered: channe quantization and channe quantization with guardband. I. INTRODUCTION Security is an important concern for wireess networks where by nature signas are transmitted in a broadcast fashion, and there is growing interest in methods that provide strong or even perfect secrecy by taking advantage of the behavior of wireess channes. For exampe, if the egitimate users have a channe with an SNR advantage reative to a potentia eavesdropper, there exists a nonzero secrecy capacity, aowing finite information to be exchanged without giving any information to the eavesdropper [], []. For fading channes, pairs of users can signa opportunisticay to create an effective SNR advantage reative to an eavesdropper, thus providing nonzero secrecy capacity even when the eavesdropper has an average SNR advantage. A probem with advantage-based methods is that some knowedge or bound about the eavesdropper channe quaity is required. Aternativey, secret keys can be generated based on fuctuations or evoution of the channe state [] []. In a wireess system with time-division dupex (TDD), the forward and reverse propagation channes are identica by reciprocity. When there is high mutipath, rapid fading causes the channe to the eavesdropper to be independent of the egitimate channe. Even for a ine-of-sight (LOS) channe without mutipath, random movement can cause channe phase fuctuations that are independent at mutipe nodes. The evoving channe state information represents common randomness [6], [7] that can be observed by the egitimate transmitter and receiver, but not at the eavesdropper, aowing keys to be dynamicay generated. Since secret key generation ony requires channe independence, it may be more practica than advantage-based methods. In practice, a number of factors imit the rate at which secret key bits can be generated: () estimation error, () spatetime correation, and () dependence of the eavesdropper and Node h a h b h a Eavesdropper h c Node Fig.. System mode for a wireess communications scenario consisting of egitimate communicating nodes and as we as a node that is an eavesdropper egitimate channe. This paper provides an information theoretic anaysis of these factors for vector Gaussian channes, indicating fundamenta imits on the number of unique key bits that can be generated per channe reaization. In addition to the information theoretic anaysis, two simpe and practica key generation schemes are considered: channe quantization (CQ) [] and a new extension to CQ that incudes guardband (CQG). The methods are simuated for a path-based fading channe mode, and their performance is compared in terms of efficiency and the mismatch rate of key bits. II. SYSTEM MODEL Figure depicts the mode for a wireess communications system. Nodes and are egitimate users that woud ike to communicate securey, whie node is a potentia eavesdropper. Reciproca vector channes h a = h a are referred to as the forward and reverse channes for egitimate communications, which are estimated by nodes and, respectivey. Channes h b and h c, on the other hand, convey information to (and are estimated by) the eavesdropper. Due to noise, the nodes have imperfect estimates of the channes, or ĥ a = h a +ɛ, ĥ a = h a +ɛ, ĥ b = h b +ɛ, ĥ c = h c +ɛ, () where ɛ i is zero-mean compex Gaussian estimation error at node i having variance σi. Note that the meaning of the eements in the channe vectors is arbitrary and can refer to mutipe frequency bins, stacked eements of a mutipe-input mutipe-output (MIMO) channe, or both. In the anaysis, it is assumed that the channes are aso zero-mean correated compex Gaussian random processes, characterized by the covariance matrices R rp = E { h r h H } } p ˆR rp = E {ĥr ĥ H p, ()
2 Fig.. ĥ a ĥ b, ĥc (i) Bits avaiabe for key generation I(ĥa;ĥa ) = I K ĥ a (ii) Secret bits I(ĥa;ĥa ĥb,ĥc) = I SK (iii) Vunerabe Bits I VK = I K I SK Graphica representation of quantities for key generation where {r, p} {a, a, b, c}. For simpicity, it is assumed that the processes are not temporay correated, which coud be achieved by ony samping the inks at intervas much onger than the coherence time or performing a pre-whitening operation. Scenarios with nonzero channe mean can aso be handed by subtracting this mean from the channes, as this does not change mutua information. A two-dimensiona path-based channe mode wi be used to describe the inks in Figure. The genera MIMO channe from transmitter k of node n to receiver i of node m is h (m,n) ik = β (m,n) r (m,n ;m,n ) i k,i k exp{jπ[x (m) i +x (n) k cos φ (m,n) cos φ(n,m) +y (n) k +y (m) i sin φ (m,n) cos φ(n,m) ]}, () where β (m,n), φ (m,n), and φ (n,m) are the compex gain, ange of arriva, and ange of departure of the th path, and (x (m) i, y (m) i ) is the coordinate of the ith antenna in waveengths at node m. The genera covariance of the inks between the nodes is represented as { = E h (m,n ) i k h (m,n ) i k }, () where i and k are stacked to obtain a standard covariance matrix. Channe variation can arise due to changing gains β, positions of the nodes, or path anges. An important specia case is that of a common transmitter n = n = n with cose receiver nodes, so that the path anges for the two receivers are identica: φ (m,n) and φ (n,m) = φ (n,m) = φ (m,n). Assuming that just the transmitter moves randomy in a arge area, the covariance reduces to r (m,n;m,n) i k,i k ψ (m,m,n) = i k,i k = (x (m) β (m,n) exp(jπψ (m,m,n) i k,i k ) () i +(y (m ) i y (m ) i +(x (n) k +(y (n) k x (m) i ) cos φ (m,n) x (n) k ) sin φ (m,n) ) cos φ (n,m) y (n) k ) sin φ (n,m ). III. INFORMATION THEORETIC ANALYSIS Figure graphicay depicts the quantities to be identified in this section, indicating the number of common key bits that can be generated and how many of these may be received by the eavesdropper. The estimated random channes ĥa and ĥa are observed by nodes and, respectivey, and the maximum number of information bits extracted from this process for key generation is I K = I(ĥa; ĥa ). The number of secure bits is the remaining mutua information when the eavesdropper channes are aready known or I SK = I(ĥa; ĥa ĥb, ĥc). The (6) number of vunerabe key bits that can be obtained by the eavesdropper is the difference of these two quantities, or I VK = I K I SK. Assuming correated zero-mean compex Gaussian random vectors for the inks, we have I K = h(ĥa) + h(ĥa ) h(ĥa, ĥa ) = og (πe) N a ˆR aa + og (πe) N a ˆR a a og (πe) Na ˆR AA = og ˆR aa ˆR a a ˆR, (7) AA where N r is the number of eements in h r, and covariances of combined (stacked) random vectors are defined as ˆR P...P M = E { qq H}, q = [p T p T... p T M ] T. (8) Straightforward evauation reveas ˆR aa = R aa + σ I (9) ˆR a a = R aa + σi () Raa + σ ˆR AA = I R aa R aa + σi. () R aa Substituting into (7) and simpifying resuts in where I K = og R aa R σ + I, () R σ = (σ + σ )I + σ σ R aa. () Evauation of the secret key bits I SK gives I SK = I(ĥa; ĥa ĥb, ĥc) = h(ĥa ĥb, ĥc) + h(ĥa ĥb, ĥc) h(ĥa, ĥ a ĥb, ĥc) = h(ĥa, ĥb, ĥc) + h(ĥa, ĥb, ĥc) h(ĥb, ĥc) h(ĥa, ĥa, ĥb, ĥc) = og ˆR ABC ˆR A BC ˆR BC ˆR AA BC, () where the covariance matrices are again the covariance of the stacked subscripted variabes. For many practica scenarios, the eavesdropper wi be far away from both nodes and, in which case ĥb and ĥc are independent of ĥa and ĥa and I SK = og ˆR A ˆR BC ˆR A ˆR BC ˆR BC ˆR AA ˆR, () BC which reduces to (7), meaning a key bits are safe. The worst case for security, however, is when the eavesdropper is near one of the nodes. Consider the case where the eavesdropper is near node and ony movement of node or scatterers causes variation of h c and h a. With the reative positions of node and fixed, h b is not random and contains no information, and () reduces to I SK = og ˆR AC ˆR A C ˆR C ˆR AA C, (6)
3 IK (bits/ch) N= N= N= Number of Paths N path Fig.. Theoretica key bits that can be generated for N transmit and receive antennas and different eves of mutipath for db SNR (channe to estimation error power ratio) and the covariances can be written expicity as Raa + σ ˆR AC = I R ac R H ac R cc + σi, (7) Raa + σ ˆR A C = I R ac R H ac R cc + σi, (8) ˆR C = R cc + σi, (9) ˆR AA C = R aa + σi R aa R ac R aa R aa + σi R ac. () R H ac R H ac R cc + σi A. Exampe Computations In this section, numerica vaues for I K and I SK are presented for the path-based channe mode with varying numbers of paths and numbers of antennas. For each pot, the resuts are averaged over random covariances, where the paths for each reaization have anges uniform on [, π] and equa power, scaed to give tota average unit power. Figure pots I K versus the number of paths and the number of transmit and receive antennas N for an SNR of db, where SNR is the mean squared estimation error divided by mean squared channe gain. For a fixed number of antennas, the shared information saturates with increasing paths, and there is a dramatic increase in the avaiabe number of key bits with additiona antennas N. Figure pots the reative number of vunerabe bits I VK /I K for a singe antenna scenario, where the eavesdropper is ocated a distance d (in waveengths) from node. Athough the eavesdropper can stea most of the key bits for itte separation or imited mutipath, the key bits are safe for reaistic separation and moderate mutipath. Figure considers a simiar scenario with antennas per user. In this case, athough many more key bits can be generated, far richer mutipath and separation are required to keep a bits safe. This suggests that adding antennas to enhance the generation rate of key bits potentiay eaks increasing information to the eavesdropper. How much information can be stoen when the eavesdropper has an advantage in SNR or the number of antennas is considered in Figures 6 and 7. For the singe antenna system in Figure 6 the eavesdropper has an SNR of db compared to db for the egitimate users. The curves are shifted up sighty, but for moderate mutipath and arge separation, most key bits are sti safe. Figure 7 indicates the resut when.8.6. N path = N path =. N path =. Eavesdropper Separation d (waveengths) Fig.. Reative number of vunerabe key bits for singe antenna channes for an eavesdropper at a distance d with varying eves of mutipath and db SNR N path = N path = N path =. Eavesdropper Separation d (waveengths) Fig.. Reative number of vunerabe key bits for N = antennas for an eavesdropper at a distance d with varying eves of mutipath and db SNR the eavesdropper has antennas compared to antennas for the egitimate users. Far more paths are required to maintain secrecy of the key, suggesting that key generation schemes may sti be vunerabe to eavesdroppers with a arge advantage. IV. PRACTICAL KEY GENERATION METHODS In this section, three different key generation methods are considered and compared in terms of their efficiency as we as their abiity to keep key bits secret from an eavesdropper. Ony singe antenna channes wi be considered, but mutipe antenna extensions are possibe by appying the methods to the mutipe dimensions separatey. For the foowing Monte Caro simuations, curves were generated considering channe reaizations. A. Channe Quantization (CQ) Perhaps the simpest method for generating a random key at nodes and is for the two nodes to simutaneousy quantize ĥ a and ĥa, respectivey []. Due to estimation error at the two nodes, sometimes the key bits wi not match, necessitating some kind of error correction method over a pubic channe. The channe quantization (CQ) is performed by dividing the tota space of observabe channes into decision regions, each with a unique bit pattern. Ideay the channe has equa probabiity of anding in any region. For vector channes, quantization can be performed individuay to mutipe independent channes, yieding more key bits per channe observation. This
4 N path =.8.6 N path =.. N path =. Eavesdropper Separation d (waveengths) I K 6... SNR (db) Fig. 6. Reative number of vunerabe key bits for an eavesdropper with an SNR advantage and singe-antenna communications. SNR at the eavesdropper is db, whie the SNR at the communicating nodes is ony db. Fig. 8. Performance of key generation using channe quantization for PSK versus SNR Decision Region N path = N path = N path = γ Guardband x x x x N γ/ x N+ = Fig. 9. Parameters for defining decision regions with guardband. Ony one positive dimension of the QAM pattern is considered, where x n is the start of the nth out of N tota decision regions separated by guardband of size γ.. Eavesdropper Separation d (waveengths) Fig. 7. Reative number of vunerabe key bits for an eavesdropper with an antenna advantage. The eavesdropper has antennas compared to at the communicating nodes, and SNR is db. paper considers decision region patterns that are simiar to those empoyed in phase shift keying (PSK) [] and quadrature ampitude moduation (QAM). Figure 8 depicts resuts for key generation with CQ using PSK regions versus the SNR. The efficiency () of the key generation is the number of matching key bits at nodes and that can be generated per channe reaization. It is assumed that a symbo mismatch is essentiay a deetion, so that a bits for that symbo are discarded. Aso potted is the idea number of key bits avaiabe I K. For the moderate SNR of db, it is noted that the symbo error rate () is quite high (around.), which may make forward error correction difficut. Athough the method has acceptaby ow for high SNR, the efficiency is far beow the theoretica imit. The fact that the and I K curves cross for ow SNR is due to the simpe definition of efficiency, since the good symbos at such high coud not reay be identified. It shoud be noted that for practica impementation, any deterministic variation of the channe phase due to carrier offset between nodes shoud be removed before appying any CQ-ike methods, since an eavesdropper can easiy derive this variation by ooking at the phase difference of channes ĥ b and ĥc. Athough not rigorousy derived or simuated, it is expected that the fraction of bits that can be stoen by the eavesdropper wi foow the same behavior studied in Section III, which is to be considered in future work. B. Channe Quantization with Guardband (CQG) One of the probems with CQ is that when the channe state is near the boundary between two regions, there is a high probabiity of a symbo error. To overcome this probem and aso to generaize the CQ idea, this work proposes dividing the domain of observabe channes into equa probabiity regions with a specified guardband between those regions. For each observed channe, the nodes ony add bits to the key if the observed channe did not fa in the guardband. A handshake mechanism is needed for the nodes to agree on whether a channe symbo shoud be accepted or not. The handshake can be uni-directiona (node aways estimates and adds a symbo when node sends the OK bit), or bi-directiona (both nodes must agree that the observed channe is not in the guardband). By making the guardband arge enough (a few standard deviations of the estimation error), the probabiity of making a symbo error can be made sma. A simpe method for generating optima decision regions is proposed here based on QAM. Figure 9 depicts the parameters of the QAM decision regions, and for regions symmetric with respect to the I and Q axes, the probem can be considered in just one dimension on the positive I axis. Here, γ is the desired minimum guardband between regions, and x [x n, x n+ γ] is the extent of the nth decision region. The basic probem is to find the x n such that the regions are equay probabe, or xn+ γ C = p(x)dx, () x n for constant C with the required guardband, or x = γ/ x n+ x n + γ x N+ =. ()
5 Fig.. Exampe CQG decision regions for 6QAM with γ =. The required regions (assuming unit-variance zero-mean Gaussian statistics on x) are obtained using an iterative procedure:. Set initia decision regions according to x = γ/, x n+ = x n + γ for n =,..., N and x N+ =, which puts a non-guardband probabiity in the N th decision region.. Compute probabiity taken by the guardband regions: g = erf(x ) and g n = erf(x n ) erf(x n γ) for n =,..., N.. Compute updated decision regions by trying to distribute probabiity not used in guardbands equay to the regions, or for each n =,..., N compute p n = erf(x n ) [ x n+ = erf pn N m=n+ g ] m + p n + γ N (n ). If the probabiities of the decision regions p d,n = erf(x n+ γ) erf(x n ) are neary equa (within some toerance), stop. Otherwise, return to step. As an exampe, Figure shows the resuts for 6QAM generated with N =, γ =., and a toerance of 6, requiring ony 9 iterations. It is found that a two-way handshake gives significanty ower for neary the same efficiency, so this wi be used in the foowing exampes. Figure shows the performance of QAM (same as PSK for CQ) for db SNR versus guardband ranging from to σ. Athough the efficiency drops ineary with the increasing guardband, the drops exponentiay aowing a eve to be chosen that can be overcome with conventiona error contro techniques. Averaging channe estimates over many training symbos may make it possibe to make channe estimation error very ow for channes with sower tempora variation. Figure depicts the resuts for higher SNR ( db) and a higher order 6QAM pattern. In this case, higher efficiency can be obtained, and moderate guardband reduces the to a manageabe eve. A probem with CQG is that the guardband reduces the efficiency of the method since channe information is sometimes discarded. It is expected that an improved method coud be deveoped that uses mutipe decision region patterns and the handshake protoco seects the most beneficia pattern to avoid a disagreement. This way, a simiar situation to guardband can be obtained, but without discarding observed channes, and this wi be studied in future work. I K.... Guardband g Fig.. Performance of channe quantization with guardband (CQG) versus the size of the guardband for QAM and db SNR I K.... Guardband g 8 6 Fig.. Performance of CQG versus guardband for 6QAM moduation and db SNR V. CONCLUSION This paper has presented information theoretic imits for key generation schemes for correated vector Gaussian channes. Two simpe key generation methods were presented, and improving the efficiency and secrecy of these methods is the subject of ongoing work. REFERENCES [] A. O. Hero, III, Secure space-time communication, IEEE Trans. Inf. Theory, vo. 9, pp. 9, Dec.. [] M. Boch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughin, Wireess information-theoretic security, IEEE Trans. Inf. Theory, vo., pp., June 8. [] T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, Wireess secret key generation expoiting reactance-domain scaar response of mutipath fading channes, IEEE Trans. Antennas Propag., vo., pp , Nov.. [] A. Sayeed and A. Perrig, Secure wireess communications: Secret keys through mutipath, in Proc. 8 IEEE Int. Conf. Acoustics, Speech, and Signa Processing, Las Vegas, NV, Mar. -Apr. 8, pp. 6. [] J. E. Hershey, A. A. Hassan, and R. Yaragadda, Unconventiona cryptographic keying variabe management, IEEE Trans. Commun., vo., pp. 6, Jan. 99. [6] I. Csiszar and P. Narayan, Common randomness and secret key generation with a heper, IEEE Trans. Inf. Theory, vo. 6, pp. 66, Mar.. [7] S. Nitinawarat, Secret key generation for correated Gaussian sources, in Proc. 8 IEEE Int. Symp. Inf. Theory, Toronto, ON, 6- Juy 8, pp
Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits
Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits Jon W. Wallace, Chan Chen, Michael A. Jensen School of Engineering and Science, Jacobs University Bremen Campus Ring,
More informationRate-Allocation Strategies for Closed-Loop MIMO-OFDM
Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu
More informationRateless Codes for the Gaussian Multiple Access Channel
Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W
More informationChannel Division Multiple Access Based on High UWB Channel Temporal Resolution
Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:
More informationResource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks
Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,
More informationTHE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN
THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN A CDMA SYSTEM Yan Zhang, Laurence B. Mistein, and Pau H. Siege Department of ECE, University of Caifornia, San Diego
More informationEffect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels
Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver
More informationPerformance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM
Performance Measures of a UWB Mutipe-Access System: DS/CDMA versus TH/PPM Aravind Kaias and John A. Gubner Dept. of Eectrica Engineering University of Wisconsin-Madison Madison, WI 53706 akaias@wisc.edu,
More informationSelf-Interference Canceller for Full-Duplex Radio Relay Station Using Virtual Coupling Wave Paths
Sef-Interference Canceer for Fu-Dupex Radio Reay Station Using Virtua Couping Wave Paths Kazunori Hayashi Yasuo Fujishima Megumi Kaneko Hideaki Sakai Riichi Kudo and Tomoki Murakami Graduate Schoo of Informatics,
More informationPower Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks
roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,
More informationSpace-Time Focusing Transmission in Ultra-wideband Cooperative Relay Networks
ICUWB 2009 (September 9-11, 2009) 1 Space-Time Focusing Transmission in Utra-wideband Cooperative Reay Networks Yafei Tian and Chenyang Yang Schoo of Eectronics and Information Engineering, Beihang University
More informationPROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS
PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER SYSTEMS Junsung Lim, Hyung G. Myung, Kyungjin Oh and David J. Goodman Dept. of Eectrica and Computer Engineering, Poytechnic University 5 Metrotech
More informationFOR energy limited data networks, e.g., sensor networks,
578 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., DECEMBER 009 An Optima Power Aocation Scheme for the STC Hybrid ARQ over Energy Limited Networks Hongbo Liu, Member, IEEE, Leonid Razoumov,
More informationADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL
ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar
More informationResource Allocation via Linear Programming for Fractional Cooperation
1 Resource Aocation via Linear Programming for Fractiona Cooperation Nariman Farsad and Andrew W Ecford Abstract In this etter, resource aocation is considered for arge muti-source, muti-reay networs empoying
More informationCopyright 2000 IEEE. IEEE Global Communications Conference (Globecom 2000), November 27 - December 1, 2000, San Francisco, California, USA
Copyright 2000 EEE. EEE Goba Communications Conference (Gobecom 2000), November 27 - December 1, 2000, San Francisco, Caifornia, USA Persona use of this materia is permitted. owever, permission to reprint/repubish
More informationDealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection?
Deaing with Lin Bocage in mmwave etwors: DD Reaying or Muti-beam Refection? Mingjie Feng, Shiwen Mao Dept. Eectrica & Computer Engineering Auburn University, Auburn, AL 36849-5, U.S.A. Tao Jiang Schoo
More informationCOMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS
COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director
More informationIterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels
Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of
More informationJoint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks
Proceedings of SDR'11-WInnComm-Europe, 22-24 Jun 2011 Joint Optima Power Aocation and Reay Seection with Spatia Diversity in Wireess Reay Networks Md Habibu Isam 1, Zbigniew Dziong 1, Kazem Sohraby 2,
More informationA Novel Method for Doppler and DOD- DOA Jointly Estimation Based on FRFT in Bistatic MIMO Radar System
7 Asia-Pacific Engineering and Technoogy Conference (APETC 7) ISBN: 978--6595-443- A Nove Method for Dopper and DOD- DOA Jointy Estimation Based on FRFT in Bistatic MIMO Radar System Derui Song, Li Li,
More informationFast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System
Fast Hybrid DF/D Architecture for OFDM in ognitive Radio System Zhu hen, Moon Ho Lee, Senior Member, EEE, hang Joo Kim 3 nstitute of nformation&ommunication, honbuk ationa University, Jeonju, 56-756,Korea
More informationBER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel
Internationa Journa of Computer ppications (0975 8887) Voume 5 No.11, Juy 011 BER Performance naysis of Cognitive Radio Physica Layer over Rayeigh fading mandeep Kaur Virk Dr. B R mbedkar Nationa Institute
More informationOn the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel
On the Reationship Between Queuing Deay and Spatia Degrees of Freedom in a IO utipe Access Channe Sriram N. Kizhakkemadam, Dinesh Rajan, andyam Srinath Dept. of Eectrica Engineering Southern ethodist University
More informationCommunication Systems
Communication Systems 1. A basic communication system consists of (1) receiver () information source (3) user of information (4) transmitter (5) channe Choose the correct sequence in which these are arranged
More informationImproving the Active Power Filter Performance with a Prediction Based Reference Generation
Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source
More informationSCHEDULING the wireless links and controlling their
3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,
More informationSatellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic
Sateite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Jing Zhu and Sumit Roy Department of Eectrica Engineering, University of Washington Box 352500, Seatte, WA 98195, USA
More informationPerformance of Single User vs. Multiuser Modulation in Wireless Multicarrier (MC) Communications
erformance of Singe User vs. Mutiuser Moduation in Wireess Muticarrier (MC) Communications Anwaru Azim, ecturer, East West University Bangadesh Abstract-- he main objective of this paper is to compare
More informationPerformance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2
ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,
More informationCoverage and Rate Analysis for Millimeter Wave Cellular Networks
Coverage and Rate Anaysis for Miimeter Wave Ceuar Networks Tianyang Bai and Robert W. Heath, Jr. arxiv:42.643v3 cs.it 8 Oct 24 Abstract Miimeter wave mmwave) hods promise as a carrier frequency for fifth
More informationCAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS
CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS Susan Joshy and A.V. Babu, Department of Eectronics & Communication Engineering, Nationa Institute
More informationEfficient Downlink Channel Reconstruction for FDD Multi-Antenna Systems
1 Efficient Downink Channe Reconstruction for FDD Muti-Antenna Systems Yu Han, Tien-Hao Hsu, Chao-Kai Wen, Kai-Kit Wong, and Shi Jin Nationa Mobie Communications Research Laboratory, Southeast University,
More informationPulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis
Pused RF Signas & Frequency Hoppers Using Rea Time Spectrum Anaysis 1 James Berry Rohde & Schwarz Pused Rea Time and Anaysis Frequency Seminar Hopper Agenda Pused Signas & Frequency Hoppers Characteristics
More informationAirborne Ultrasonic Position and Velocity Measurement Using Two Cycles of Linear-Period-Modulated Signal
Airborne Utrasonic Position and Veocity Measurement Using Two Cyces of Linear-Period-Moduated Signa Shinya Saito 1, Minoru Kuribayashi Kurosawa 1, Yuichiro Orino 1, and Shinnosuke Hirata 2 1 Department
More informationTEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS
TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS Ingmar Hammerström, Jian Zhao, and Armin Wittneben Swiss Federa Institute of Technoogy (ETH)
More informationJoint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,
More informationCross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W.
www.ietd.org Pubished in IET Communications Received on 18th June 2009 Revised on 30th Juy 2009 ISSN 1751-8628 Cross-ayer queuing anaysis on mutihop reaying networks with adaptive moduation and coding
More informationDistributed Antenna System for Mitigating Shadowing Effect in 60 GHz WLAN
Distributed Antenna System for Mitigating Shadowing Effect in 60 GHz WLAN Citation for pubished version (APA): Wang, Q., Debbarma, D., Lo, A., Cao, Z., Niemegeers, I., & Heemstra, S. (2015). Distributed
More informationSparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints
Sparse Beamforming Design for Networ MIMO System with Per-Base-Station Bachau Constraints Binbin Dai and Wei Yu Department of Eectrica and Computer Engineering University of Toronto, Toronto, Ontario M5S
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003.
Coon, J., Siew, J., Beach, MA., Nix, AR., Armour, SMD., & McGeehan, JP. (3). A comparison of MIMO-OFDM and MIMO-SCFDE in WLAN environments. In Goba Teecommunications Conference, 3 (Gobecom 3) (Vo. 6, pp.
More informationOn the Relationship Between Capacity and Distance in an Underwater Acoustic Communication Channel
On the Reationship Between Capacity and Distance in an Underwater Acoustic Communication Channe Miica Stojanovic Massachusetts Institute of Technoogy miitsa@mit.edu ABSTRACT Path oss of an underwater acoustic
More informationProject: IEEE P Working Group for Wireless Personal Area Networks N
Project: IEEE P802.15 Working Group for Wireess Persona Area Networks N (WPANs( WPANs) Tite: [MATLAB Simuation Program for TSV-channe mode] Date Submitted: [September 18, 2006] Source: [Hiroshi Harada,
More informationUtility-Proportional Fairness in Wireless Networks
IEEE rd Internationa Symposium on Persona, Indoor and Mobie Radio Communications - (PIMRC) Utiity-Proportiona Fairness in Wireess Networks G. Tychogiorgos, A. Gkeias and K. K. Leung Eectrica and Eectronic
More informationBest Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks
IEEE ICC 1 - Wireess Communications Symposium Best Reay Seection Using SNR and Interference Quotient for Underay Cognitive Networks Syed Imtiaz Hussain 1, Mohamed M. Abdaah 1, Mohamed-Sim Aouini 1,, Mazen
More informationInformation Theoretic Radar Waveform Design for Multiple Targets
1 Information Theoretic Radar Waveform Design for Mutipe Targets Amir Leshem and Arye Nehorai Abstract In this paper we use information theoretic approach to design radar waveforms suitabe for simutaneousy
More informationOn optimizing low SNR wireless networks using network coding
On optimizing ow SNR wireess networks using network coding Mohit Thakur Institute for communications engineering, Technische Universität München, 80290, München, Germany. Emai: mohit.thakur@tum.de Murie
More informationA Game-theoretic Approach to Power Management in MIMO-OFDM. Ad Hoc Networks. A Dissertation. Submitted to the Faculty. Drexel University.
A Game-theoretic Approach to Power Management in MIMO-OFDM Ad Hoc Networks A Dissertation Submitted to the Facuty of Drexe University by Chao Liang in partia fufiment of the requirements for the degree
More informationTransmit-Diversity-Assisted Space-Shift Keying for Colocated and Distributed/Cooperative MIMO Elements
2864 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL 60, NO 6, JULY 2011 Transmit-Diversity-Assisted Space-Shift Keying for Coocated and Distributed/Cooperative MIMO Eements Du Yang, Chao Xu, Student Member,
More informationJoint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic
Joint Spectrum Access and Pricing in Cognitive Radio Networks with Eastic Traffic Joceyne Eias University of Bergamo E-mai: joceyne.eias@unibg.it Fabio Martignon University of Bergamo E-mai: fabio.martignon@unibg.it
More informationAN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS
SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp. 702 712, June 1998 008 AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR
More informationEffect of Random Walk Phase Noise on MIMO Measurements
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Effect of Random Wak Phase Noise on MIMO Measurements Peter Amers, Shurjee Wyne, Fredrik Tufvesson and Andreas Moisch TR25-59 Juy 25 Abstract
More informationSecrecy Outage Analysis over Correlated Composite Nakagami-m/Gamma Fading Channels
Secrecy Outage Anaysis over Correated Composite Nakagami-m/Gamma Fading Channes George C. Aexandropouos, Senior Member, IEEE and Kostas P. Peppas, Senior Member, IEEE arxiv:7.9v [cs.it] 3 Oct 7 Abstract
More informationSparse Channel Estimation Based on Compressed Sensing for Massive MIMO Systems
Sparse Channe Estimation Based on Compressed Sensing for Massive MIMO Systems Chenhao Qi, Yongming Huang, Shi Jin and Lenan Wu Schoo of Information Science and Engineering, Southeast University, Nanjing
More informationLow Delay Wind Noise Cancellation for Binaural Hearing Aids
INTER-NOISE 6 Low Deay Wind Noise Canceation for Binaura Hearing Aids Nobuhio HIRUMA ; Ryousue KOUYAMA ; Hidetoshi NAKASHIMA 3 ; Yoh-ichi FUJISAKA 4, 4 Rion Co., Ltd, Japan, 3 Nationa Institute of Technoogy,
More informationAvailability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique
Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang
More informationSpatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Spatia Reuse in Dense Wireess Areas: A Cross-ayer Optimization Approach via ADMM Haeh Tabrizi, Member, IEEE, Borja Peeato, Member, IEEE, Gonaz Farhadi, Member,
More informationSuppression of ISI Caused by Sampling Time Offset in IFDMA Systems
Suppression of ISI Caused by Samping Time Offset in IFDA Systems Aexander Arkhipov, ichae Schne German Aerospace Center (DLR), Inst. of Communications and Navigation, D-82234, Wessing, Germany. Phone/e-mai:
More informationCo-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel
Co-channe Interference Suppression Techniques for STBC OFDM System over Douby Seective Channe Jyoti P. Patra Dept. of Eectronics and Communication Nationa Institute Of Technoogy Rourkea-769008, India E
More informationCHANNEL ESTIMATION PERFORMANCE FOR ZERO-OVERHEAD CHANNEL ACCESS IN MOBILE SENSOR NETWORKS
CANNEL ESTIMATION PERFORMANCE FOR ZERO-OVEREAD CANNEL ACCESS IN MOBILE SENSOR NETWORKS John E. Keider, Ghassan Maaoui, Steve Gifford, and Scott Chuprun Genera Dynamics C4 Systems Scottsdae, AZ, 8557 Brian
More informationarxiv: v4 [physics.soc-ph] 31 Dec 2013
A Cascading Faiure Mode by Quantifying Interactions Junjian Qi and Shengwei Mei Department of Eectrica Engineering, Tsinghua University, Beijing, China 100084 arxiv:1301.2055v4 [physics.soc-ph] 31 Dec
More informationDESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION
Undergraduate Research Opportunity Project (UROP ) DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Student: Nguyen, Tran Thanh Binh Schoo of Eectrica & Eectronic Engineering Nayang Technoogica University
More informationAnalyzing Uplink SINR and Rate in Massive. MIMO Systems Using Stochastic Geometry
Anayzing Upink SINR and Rate in Massive MIMO Systems Using Stochastic Geometry Tianyang Bai and Robert W. Heath, Jr. arxiv:5.2538v2 [cs.it] 2 Apr 26 Abstract This paper proposes a stochastic geometry framework
More informationTheoretical Analysis of Power Saving in Cognitive Radio with Arbitrary Inputs
Theoretica Anaysis of Power Saving in Cognitive Radio with Arbitrary Inputs Ahmed Sohai, Mohammed A-Imari, Pei Xiao, and Barry G. Evans Abstract In Orthogona Frequency Division Mutipexing (OFDM based cognitive
More informationOptimal and Suboptimal Finger Selection Algorithms for MMSE Rake Receivers in Impulse Radio Ultra-Wideband Systems 1
Optima and Suboptima Finger Seection Agorithms for MMSE Rake Receivers in Impuse Radio Utra-Wideband Systems Sinan Gezici, Mung Chiang, H. Vincent Poor and Hisashi Kobayashi Department of Eectrica Engineering
More informationUplink Massive MIMO SIR Analysis: How do Antennas Scale with Users?
Upink Massive MIMO SIR Anaysis: How do Antennas Scae with Users? Tianyang Bai and Robert W. Heath, Jr. Wireess Networking and Communication Group The University of Texas at Austin 66 Guadaupe Street, C83,
More informationTHE EMERGING IEEE ad wireless local area
1 Suboptima Spatia Diversity Scheme for 60 Gz Miimeter-Wave WLAN Zhenyu Xiao, Member, IEEE arxiv:1511.02326v1 [cs.it] 7 Nov 2015 Abstract This etter revisits the equa-gain (EG) spatia diversity technique,
More informationFREQUENCY-DOMAIN TURBO EQUALIZATION FOR SINGLE CARRIER MOBILE BROADBAND SYSTEMS. Liang Dong and Yao Zhao
FREQUENCY-DOMAIN TURBO EQUALIZATION FOR SINGLE CARRIER MOBILE BROADBAND SYSTEMS Liang Dong and Yao Zhao Department of Eectrica and Computer Engineering Western Michigan University Kaamazoo, MI 49008 ABSTRACT
More informationIEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. -, NO. -, - 1
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. -, NO. -, - QuaDRiGa: A 3-D Muti-Ce Channe Mode with Time Evoution for Enabing Virtua Fied Trias Stephan Jaecke, Member, IEEE, Leszek Raschkowski, Kai
More informationAdaptive Bit and Power Allocation for Rate and Margin Maximization in V-BLAST System
Revista Científica Periódica - Teecomunicações ISSN 56-338 Adaptive Bit and Power Aocation for Rate and argin aximization in V-BAST System Dror eiri and Irving Kaet Aeis Photonics, Netanya, Israe (emai:
More informationA Distributed Utility Max-Min Flow Control Algorithm
A Distributed tiity Max-Min Fow Contro Agorithm Hyang-Won Lee and Song Chong Department of Eectrica Engineering and Computer Science Korea Advanced Institute of Science and Technoogy (KAIST) mshw@netsys.kaist.ac.kr,
More informationA capacity-approaching coded modulation scheme for non-coherent fading channels
Louisiana State University LSU Digita Commons LSU Master's Theses Graduate Schoo 008 A capacity-approaching coded moduation scheme for non-coherent fading channes Youngjeon Cho Louisiana State University
More informationBlind Multiuser Detection in Asynchronous DS-CDMA Systems over Nakagami-m Fading Channels
Bind Mutiuser Detection in Asynchronous DS-CDMA Systems over akagami-m Fading Channes Vinay Kumar Pamua JU Kakinada, Andhra Pradesh, India 533 003 pamuavk@yahoo.com ABSRAC his paper presents a technique
More informationWireless Communications
Wireess Communications Mutipe Access Hamid Bahrami Eectrica & Computer Engineering Communication System Bock Diagram Dupexing Dupexing: transmit and receive at the same time Exampe: teephone, how about
More informationMultiuser Detection for Out-of-Cell Cochannel Interference Mitigation in the IS 95 Downlink
1 Mutiuser Detection for Out-of-Ce Cochanne Interference Mitigation in the IS 95 Downink D. Richard Brown III, H. Vincent Poor, Sergio Verdú, and C. Richard Johnson, Jr. This research was supported in
More informationWireless Communications
Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve
More informationJoint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 0.09/ACCESS.07.70008,
More informationDistributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach
Distributed Resource Aocation for Reay-Aided Device-to-Device Communication Under Channe Uncertainties: A Stabe Matching Approach Monowar Hasan, Student Member, IEEE, and Ekram Hossain, Feow, IEEE Abstract
More informationLSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION
LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION Jinyu Li, Abderahman Mohamed, Geoffrey Zweig, and Yifan Gong Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 { jinyi, asamir,
More informationCapacity of Data Collection in Arbitrary Wireless Sensor Networks
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess
More informationHybrid Digital-Analog Joint Source Channel Coding for Broadcast Multiresolution Communications
217 25th European Signa Processing Conference (EUSIPCO) Hybrid Digita-Anaog Joint Source Channe Coding for Broadcast Mutiresoution Communications O. Fresnedo, P. Suárez-Casa, L. Castedo Department of Eectronics
More informationCHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI
CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI Jivisha, Gaurav Mohta, Saumya Das Siim Manipa Institute of Technoogy Emai Id- gauravmohta.officia@gmai.com; Ph No. +9 9609850304 Abstract Wi-Fi or wireess
More informationDistribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection
Distribution of ath Durations in Mobie Ad-Hoc Networks and ath Seection Richard J. La and Yijie Han Abstract We investigate the issue of path seection in mutihop wireess networks with the goa of identifying
More informationEffect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM
Effect of Interfering Users on the Moduation Order and Code Rate for UWB Impuse-Radio Bit-Intereaved Coded M-ary PPM Ruben Merz and Jean-Yves Le Boudec EPFL, Schoo of Computer and Communication Sciences
More informationEnergy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks
Energy-Aware Scheduing with Quaity of Surveiance Guarantee in Wireess Sensor Networks Jaehoon Jeong, Sarah Sharafkandi, and David H.C. Du Dept. of Computer Science and Engineering, University of Minnesota
More informationChannel Estimation for SC-FDE Systems Using Frequency Domain Multiplexed Pilots
Channe Estimation for SC-FDE Systems Using Frequency Domain utipexed Piots Chan-Tong am, David D. Faconer and Forence Danio-emoine BCWS, Careton Univ., Canada K1S 5B6 Emai: {amc, ddf, fdanio@sce.careton.ca
More informationNEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE
The 14 th Word Conference on Earthquake Engineering NEW RISK ANALYSIS ETHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE Satoru Nishikawa 1, Sei ichiro Fukushima 2 and Harumi Yashiro 3 ABSTRACT
More informationHybrid Digital-to-Analog Beamforming for Millimeter-Wave Systems with High User Density
Hybrid Digita-to-Anaog Beamforming for Miimeter-Wave Systems with High User Density Manish Nair, Qasim Zeeshan Ahmed and Huiing Zhu Schoo of Engineering and Digita Arts, University of Kent, Canterbury,
More informationINTERNATIONAL TELECOMMUNICATION UNION 02/4%#4)/.!'!).34 ).4%2&%2%.#%
INTERNATIONAL TELECOMMUNICATION UNION )454 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU 02/4%#4)/!'!)34 )4%2&%2%#% #!,#5,!4)/ /& 6/,4!'% )$5#%$ )4/ 4%,%#/--5)#!4)/,)%3 &2/- 2!$)/ 34!4)/ "2/!$#!343!$
More informationEnergy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems
Energy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems invited paper Ahmad Asharoa, Abdukadir Ceik, Ahmed E. Kama Iowa State University ISU, Ames, Iowa, United States, Emai:
More informationBlock-Level Unitary Query: Incorporating Orthogonal-like Space-time Code with Query Diversity for MIMO Backscatter RFID
1 Bock-Leve Unitary Query: Incorporating Orthogona-ike Space-time Code with Query Diversity for MIMO Backscatter RFID Chen He, Member, IEEE, Z. Jane Wang, Senior Member, IEEE, and Victor C.M. Leung, Feow,
More informationRun to Potential: Sweep Coverage in Wireless Sensor Networks
Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,
More informationPower Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation
Power Spectrum Optimization for Interference Mitigation via Iterative Function Evauation Hayssam Dahrouj, Wei Yu, Taiwen Tang, and Steve Beaudin Eectrica and Computer Engineering Dept., University of Toronto,
More informationTop Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobility Fading Channels
Top Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobiity Fading Channes Juinn-Horng Deng, Feng-Chin Hsiao, and Yi-Hsin Lin Department of Communications Engineering
More informationWIFI-BASED IMAGING FOR GPR APPLICATIONS: FUNDAMENTAL STUDY AND EXPERIMENTAL RESULTS
WIFI-BASED IMAGING FOR GPR APPICATIONS: FUNDAMENTA STUDY AND EXPERIMENTA RESUTS Weike Feng *, Jean-Miche Friedt, Zhipeng Hu 3, Grigory Cherniak, and Motoyuki Sato 4 Graduate Schoo of Environmenta Studies,
More informationA Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access
0 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 5, NO., JUNE 007 A Low Compexity VCS Method for PAPR Reduction in Muticarrier Code Division Mutipe Access Si-Si Liu, Yue iao, Qing-Song Wen,
More informationRelays that Cooperate to Compute
Reays that Cooperate to Compute Matthew Nokeby Rice University nokeby@rice.edu Bobak Nazer Boston University bobak@bu.edu Behnaam Aazhang Rice University aaz@rice.edu Natasha evroye University of Iinois
More informationDistributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach
Distributed Resource Aocation for Reay-Aided Device-to-Device Communication: A Message Passing Approach Monowar Hasan and Ekram Hossain arxiv:406.323v [cs.ni] 2 Jun 204 Abstract Device-to-device D2D communication
More informationR is in the unit of ma/mw or A/W. For semiconductor detectors, the value is approximately, 0.5 ma/mw.
Light Detection Conventiona methods for the detection of ight can be categorized into photo-synthesis, photographic pate, and photoeectric effect. Photo-synthesis and photographic pate are based on ight-induced
More informationOptimum Fault Current Limiter Placement
Optimum aut urrent Limiter acement Jen-Hao Teng han-an Lu Abstract: Due to the difficuty in power network reinforcement and the interconnection of more distributed generations, faut current eve has become
More information