Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits

Size: px
Start display at page:

Download "Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits"

Transcription

1 Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: Emai: Abstract There is growing interest in wireess security methods that provide strong or even perfect secrecy by taking advantage of features of the physica propagation channe. In advantage-based methods, high channe quaity in an average or opportunistic sense is expoited between two egitimate nodes, such that nonzero secrecy capacity can be achieved. Since such methods require bounds on the quaity of the eavesdropper channe, they are somewhat impractica. Secret key generation based on tracking channe evoution in time division dupex systems is a more attractive option, where two nodes generate secret key bits based on a mutuay known random channe. Since the eavesdropper channe is typicay independent of the egitimate channe, the key can ony be broken by brute force attacks, which are difficut when new keys are continuousy generated. In this paper, the information theoretic imits of key generation schemes are investigated, based on the eve of estimation error, tempora correation, and dependence of the eavesdropper and egitimate channes. Two practica candidate key generation schemes are aso considered: channe quantization and channe quantization with guardband. I. INTRODUCTION Security is an important concern for wireess networks where by nature signas are transmitted in a broadcast fashion, and there is growing interest in methods that provide strong or even perfect secrecy by taking advantage of the behavior of wireess channes. For exampe, if the egitimate users have a channe with an SNR advantage reative to a potentia eavesdropper, there exists a nonzero secrecy capacity, aowing finite information to be exchanged without giving any information to the eavesdropper [], []. For fading channes, pairs of users can signa opportunisticay to create an effective SNR advantage reative to an eavesdropper, thus providing nonzero secrecy capacity even when the eavesdropper has an average SNR advantage. A probem with advantage-based methods is that some knowedge or bound about the eavesdropper channe quaity is required. Aternativey, secret keys can be generated based on fuctuations or evoution of the channe state [] []. In a wireess system with time-division dupex (TDD), the forward and reverse propagation channes are identica by reciprocity. When there is high mutipath, rapid fading causes the channe to the eavesdropper to be independent of the egitimate channe. Even for a ine-of-sight (LOS) channe without mutipath, random movement can cause channe phase fuctuations that are independent at mutipe nodes. The evoving channe state information represents common randomness [6], [7] that can be observed by the egitimate transmitter and receiver, but not at the eavesdropper, aowing keys to be dynamicay generated. Since secret key generation ony requires channe independence, it may be more practica than advantage-based methods. In practice, a number of factors imit the rate at which secret key bits can be generated: () estimation error, () spatetime correation, and () dependence of the eavesdropper and Node h a h b h a Eavesdropper h c Node Fig.. System mode for a wireess communications scenario consisting of egitimate communicating nodes and as we as a node that is an eavesdropper egitimate channe. This paper provides an information theoretic anaysis of these factors for vector Gaussian channes, indicating fundamenta imits on the number of unique key bits that can be generated per channe reaization. In addition to the information theoretic anaysis, two simpe and practica key generation schemes are considered: channe quantization (CQ) [] and a new extension to CQ that incudes guardband (CQG). The methods are simuated for a path-based fading channe mode, and their performance is compared in terms of efficiency and the mismatch rate of key bits. II. SYSTEM MODEL Figure depicts the mode for a wireess communications system. Nodes and are egitimate users that woud ike to communicate securey, whie node is a potentia eavesdropper. Reciproca vector channes h a = h a are referred to as the forward and reverse channes for egitimate communications, which are estimated by nodes and, respectivey. Channes h b and h c, on the other hand, convey information to (and are estimated by) the eavesdropper. Due to noise, the nodes have imperfect estimates of the channes, or ĥ a = h a +ɛ, ĥ a = h a +ɛ, ĥ b = h b +ɛ, ĥ c = h c +ɛ, () where ɛ i is zero-mean compex Gaussian estimation error at node i having variance σi. Note that the meaning of the eements in the channe vectors is arbitrary and can refer to mutipe frequency bins, stacked eements of a mutipe-input mutipe-output (MIMO) channe, or both. In the anaysis, it is assumed that the channes are aso zero-mean correated compex Gaussian random processes, characterized by the covariance matrices R rp = E { h r h H } } p ˆR rp = E {ĥr ĥ H p, ()

2 Fig.. ĥ a ĥ b, ĥc (i) Bits avaiabe for key generation I(ĥa;ĥa ) = I K ĥ a (ii) Secret bits I(ĥa;ĥa ĥb,ĥc) = I SK (iii) Vunerabe Bits I VK = I K I SK Graphica representation of quantities for key generation where {r, p} {a, a, b, c}. For simpicity, it is assumed that the processes are not temporay correated, which coud be achieved by ony samping the inks at intervas much onger than the coherence time or performing a pre-whitening operation. Scenarios with nonzero channe mean can aso be handed by subtracting this mean from the channes, as this does not change mutua information. A two-dimensiona path-based channe mode wi be used to describe the inks in Figure. The genera MIMO channe from transmitter k of node n to receiver i of node m is h (m,n) ik = β (m,n) r (m,n ;m,n ) i k,i k exp{jπ[x (m) i +x (n) k cos φ (m,n) cos φ(n,m) +y (n) k +y (m) i sin φ (m,n) cos φ(n,m) ]}, () where β (m,n), φ (m,n), and φ (n,m) are the compex gain, ange of arriva, and ange of departure of the th path, and (x (m) i, y (m) i ) is the coordinate of the ith antenna in waveengths at node m. The genera covariance of the inks between the nodes is represented as { = E h (m,n ) i k h (m,n ) i k }, () where i and k are stacked to obtain a standard covariance matrix. Channe variation can arise due to changing gains β, positions of the nodes, or path anges. An important specia case is that of a common transmitter n = n = n with cose receiver nodes, so that the path anges for the two receivers are identica: φ (m,n) and φ (n,m) = φ (n,m) = φ (m,n). Assuming that just the transmitter moves randomy in a arge area, the covariance reduces to r (m,n;m,n) i k,i k ψ (m,m,n) = i k,i k = (x (m) β (m,n) exp(jπψ (m,m,n) i k,i k ) () i +(y (m ) i y (m ) i +(x (n) k +(y (n) k x (m) i ) cos φ (m,n) x (n) k ) sin φ (m,n) ) cos φ (n,m) y (n) k ) sin φ (n,m ). III. INFORMATION THEORETIC ANALYSIS Figure graphicay depicts the quantities to be identified in this section, indicating the number of common key bits that can be generated and how many of these may be received by the eavesdropper. The estimated random channes ĥa and ĥa are observed by nodes and, respectivey, and the maximum number of information bits extracted from this process for key generation is I K = I(ĥa; ĥa ). The number of secure bits is the remaining mutua information when the eavesdropper channes are aready known or I SK = I(ĥa; ĥa ĥb, ĥc). The (6) number of vunerabe key bits that can be obtained by the eavesdropper is the difference of these two quantities, or I VK = I K I SK. Assuming correated zero-mean compex Gaussian random vectors for the inks, we have I K = h(ĥa) + h(ĥa ) h(ĥa, ĥa ) = og (πe) N a ˆR aa + og (πe) N a ˆR a a og (πe) Na ˆR AA = og ˆR aa ˆR a a ˆR, (7) AA where N r is the number of eements in h r, and covariances of combined (stacked) random vectors are defined as ˆR P...P M = E { qq H}, q = [p T p T... p T M ] T. (8) Straightforward evauation reveas ˆR aa = R aa + σ I (9) ˆR a a = R aa + σi () Raa + σ ˆR AA = I R aa R aa + σi. () R aa Substituting into (7) and simpifying resuts in where I K = og R aa R σ + I, () R σ = (σ + σ )I + σ σ R aa. () Evauation of the secret key bits I SK gives I SK = I(ĥa; ĥa ĥb, ĥc) = h(ĥa ĥb, ĥc) + h(ĥa ĥb, ĥc) h(ĥa, ĥ a ĥb, ĥc) = h(ĥa, ĥb, ĥc) + h(ĥa, ĥb, ĥc) h(ĥb, ĥc) h(ĥa, ĥa, ĥb, ĥc) = og ˆR ABC ˆR A BC ˆR BC ˆR AA BC, () where the covariance matrices are again the covariance of the stacked subscripted variabes. For many practica scenarios, the eavesdropper wi be far away from both nodes and, in which case ĥb and ĥc are independent of ĥa and ĥa and I SK = og ˆR A ˆR BC ˆR A ˆR BC ˆR BC ˆR AA ˆR, () BC which reduces to (7), meaning a key bits are safe. The worst case for security, however, is when the eavesdropper is near one of the nodes. Consider the case where the eavesdropper is near node and ony movement of node or scatterers causes variation of h c and h a. With the reative positions of node and fixed, h b is not random and contains no information, and () reduces to I SK = og ˆR AC ˆR A C ˆR C ˆR AA C, (6)

3 IK (bits/ch) N= N= N= Number of Paths N path Fig.. Theoretica key bits that can be generated for N transmit and receive antennas and different eves of mutipath for db SNR (channe to estimation error power ratio) and the covariances can be written expicity as Raa + σ ˆR AC = I R ac R H ac R cc + σi, (7) Raa + σ ˆR A C = I R ac R H ac R cc + σi, (8) ˆR C = R cc + σi, (9) ˆR AA C = R aa + σi R aa R ac R aa R aa + σi R ac. () R H ac R H ac R cc + σi A. Exampe Computations In this section, numerica vaues for I K and I SK are presented for the path-based channe mode with varying numbers of paths and numbers of antennas. For each pot, the resuts are averaged over random covariances, where the paths for each reaization have anges uniform on [, π] and equa power, scaed to give tota average unit power. Figure pots I K versus the number of paths and the number of transmit and receive antennas N for an SNR of db, where SNR is the mean squared estimation error divided by mean squared channe gain. For a fixed number of antennas, the shared information saturates with increasing paths, and there is a dramatic increase in the avaiabe number of key bits with additiona antennas N. Figure pots the reative number of vunerabe bits I VK /I K for a singe antenna scenario, where the eavesdropper is ocated a distance d (in waveengths) from node. Athough the eavesdropper can stea most of the key bits for itte separation or imited mutipath, the key bits are safe for reaistic separation and moderate mutipath. Figure considers a simiar scenario with antennas per user. In this case, athough many more key bits can be generated, far richer mutipath and separation are required to keep a bits safe. This suggests that adding antennas to enhance the generation rate of key bits potentiay eaks increasing information to the eavesdropper. How much information can be stoen when the eavesdropper has an advantage in SNR or the number of antennas is considered in Figures 6 and 7. For the singe antenna system in Figure 6 the eavesdropper has an SNR of db compared to db for the egitimate users. The curves are shifted up sighty, but for moderate mutipath and arge separation, most key bits are sti safe. Figure 7 indicates the resut when.8.6. N path = N path =. N path =. Eavesdropper Separation d (waveengths) Fig.. Reative number of vunerabe key bits for singe antenna channes for an eavesdropper at a distance d with varying eves of mutipath and db SNR N path = N path = N path =. Eavesdropper Separation d (waveengths) Fig.. Reative number of vunerabe key bits for N = antennas for an eavesdropper at a distance d with varying eves of mutipath and db SNR the eavesdropper has antennas compared to antennas for the egitimate users. Far more paths are required to maintain secrecy of the key, suggesting that key generation schemes may sti be vunerabe to eavesdroppers with a arge advantage. IV. PRACTICAL KEY GENERATION METHODS In this section, three different key generation methods are considered and compared in terms of their efficiency as we as their abiity to keep key bits secret from an eavesdropper. Ony singe antenna channes wi be considered, but mutipe antenna extensions are possibe by appying the methods to the mutipe dimensions separatey. For the foowing Monte Caro simuations, curves were generated considering channe reaizations. A. Channe Quantization (CQ) Perhaps the simpest method for generating a random key at nodes and is for the two nodes to simutaneousy quantize ĥ a and ĥa, respectivey []. Due to estimation error at the two nodes, sometimes the key bits wi not match, necessitating some kind of error correction method over a pubic channe. The channe quantization (CQ) is performed by dividing the tota space of observabe channes into decision regions, each with a unique bit pattern. Ideay the channe has equa probabiity of anding in any region. For vector channes, quantization can be performed individuay to mutipe independent channes, yieding more key bits per channe observation. This

4 N path =.8.6 N path =.. N path =. Eavesdropper Separation d (waveengths) I K 6... SNR (db) Fig. 6. Reative number of vunerabe key bits for an eavesdropper with an SNR advantage and singe-antenna communications. SNR at the eavesdropper is db, whie the SNR at the communicating nodes is ony db. Fig. 8. Performance of key generation using channe quantization for PSK versus SNR Decision Region N path = N path = N path = γ Guardband x x x x N γ/ x N+ = Fig. 9. Parameters for defining decision regions with guardband. Ony one positive dimension of the QAM pattern is considered, where x n is the start of the nth out of N tota decision regions separated by guardband of size γ.. Eavesdropper Separation d (waveengths) Fig. 7. Reative number of vunerabe key bits for an eavesdropper with an antenna advantage. The eavesdropper has antennas compared to at the communicating nodes, and SNR is db. paper considers decision region patterns that are simiar to those empoyed in phase shift keying (PSK) [] and quadrature ampitude moduation (QAM). Figure 8 depicts resuts for key generation with CQ using PSK regions versus the SNR. The efficiency () of the key generation is the number of matching key bits at nodes and that can be generated per channe reaization. It is assumed that a symbo mismatch is essentiay a deetion, so that a bits for that symbo are discarded. Aso potted is the idea number of key bits avaiabe I K. For the moderate SNR of db, it is noted that the symbo error rate () is quite high (around.), which may make forward error correction difficut. Athough the method has acceptaby ow for high SNR, the efficiency is far beow the theoretica imit. The fact that the and I K curves cross for ow SNR is due to the simpe definition of efficiency, since the good symbos at such high coud not reay be identified. It shoud be noted that for practica impementation, any deterministic variation of the channe phase due to carrier offset between nodes shoud be removed before appying any CQ-ike methods, since an eavesdropper can easiy derive this variation by ooking at the phase difference of channes ĥ b and ĥc. Athough not rigorousy derived or simuated, it is expected that the fraction of bits that can be stoen by the eavesdropper wi foow the same behavior studied in Section III, which is to be considered in future work. B. Channe Quantization with Guardband (CQG) One of the probems with CQ is that when the channe state is near the boundary between two regions, there is a high probabiity of a symbo error. To overcome this probem and aso to generaize the CQ idea, this work proposes dividing the domain of observabe channes into equa probabiity regions with a specified guardband between those regions. For each observed channe, the nodes ony add bits to the key if the observed channe did not fa in the guardband. A handshake mechanism is needed for the nodes to agree on whether a channe symbo shoud be accepted or not. The handshake can be uni-directiona (node aways estimates and adds a symbo when node sends the OK bit), or bi-directiona (both nodes must agree that the observed channe is not in the guardband). By making the guardband arge enough (a few standard deviations of the estimation error), the probabiity of making a symbo error can be made sma. A simpe method for generating optima decision regions is proposed here based on QAM. Figure 9 depicts the parameters of the QAM decision regions, and for regions symmetric with respect to the I and Q axes, the probem can be considered in just one dimension on the positive I axis. Here, γ is the desired minimum guardband between regions, and x [x n, x n+ γ] is the extent of the nth decision region. The basic probem is to find the x n such that the regions are equay probabe, or xn+ γ C = p(x)dx, () x n for constant C with the required guardband, or x = γ/ x n+ x n + γ x N+ =. ()

5 Fig.. Exampe CQG decision regions for 6QAM with γ =. The required regions (assuming unit-variance zero-mean Gaussian statistics on x) are obtained using an iterative procedure:. Set initia decision regions according to x = γ/, x n+ = x n + γ for n =,..., N and x N+ =, which puts a non-guardband probabiity in the N th decision region.. Compute probabiity taken by the guardband regions: g = erf(x ) and g n = erf(x n ) erf(x n γ) for n =,..., N.. Compute updated decision regions by trying to distribute probabiity not used in guardbands equay to the regions, or for each n =,..., N compute p n = erf(x n ) [ x n+ = erf pn N m=n+ g ] m + p n + γ N (n ). If the probabiities of the decision regions p d,n = erf(x n+ γ) erf(x n ) are neary equa (within some toerance), stop. Otherwise, return to step. As an exampe, Figure shows the resuts for 6QAM generated with N =, γ =., and a toerance of 6, requiring ony 9 iterations. It is found that a two-way handshake gives significanty ower for neary the same efficiency, so this wi be used in the foowing exampes. Figure shows the performance of QAM (same as PSK for CQ) for db SNR versus guardband ranging from to σ. Athough the efficiency drops ineary with the increasing guardband, the drops exponentiay aowing a eve to be chosen that can be overcome with conventiona error contro techniques. Averaging channe estimates over many training symbos may make it possibe to make channe estimation error very ow for channes with sower tempora variation. Figure depicts the resuts for higher SNR ( db) and a higher order 6QAM pattern. In this case, higher efficiency can be obtained, and moderate guardband reduces the to a manageabe eve. A probem with CQG is that the guardband reduces the efficiency of the method since channe information is sometimes discarded. It is expected that an improved method coud be deveoped that uses mutipe decision region patterns and the handshake protoco seects the most beneficia pattern to avoid a disagreement. This way, a simiar situation to guardband can be obtained, but without discarding observed channes, and this wi be studied in future work. I K.... Guardband g Fig.. Performance of channe quantization with guardband (CQG) versus the size of the guardband for QAM and db SNR I K.... Guardband g 8 6 Fig.. Performance of CQG versus guardband for 6QAM moduation and db SNR V. CONCLUSION This paper has presented information theoretic imits for key generation schemes for correated vector Gaussian channes. Two simpe key generation methods were presented, and improving the efficiency and secrecy of these methods is the subject of ongoing work. REFERENCES [] A. O. Hero, III, Secure space-time communication, IEEE Trans. Inf. Theory, vo. 9, pp. 9, Dec.. [] M. Boch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughin, Wireess information-theoretic security, IEEE Trans. Inf. Theory, vo., pp., June 8. [] T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, Wireess secret key generation expoiting reactance-domain scaar response of mutipath fading channes, IEEE Trans. Antennas Propag., vo., pp , Nov.. [] A. Sayeed and A. Perrig, Secure wireess communications: Secret keys through mutipath, in Proc. 8 IEEE Int. Conf. Acoustics, Speech, and Signa Processing, Las Vegas, NV, Mar. -Apr. 8, pp. 6. [] J. E. Hershey, A. A. Hassan, and R. Yaragadda, Unconventiona cryptographic keying variabe management, IEEE Trans. Commun., vo., pp. 6, Jan. 99. [6] I. Csiszar and P. Narayan, Common randomness and secret key generation with a heper, IEEE Trans. Inf. Theory, vo. 6, pp. 66, Mar.. [7] S. Nitinawarat, Secret key generation for correated Gaussian sources, in Proc. 8 IEEE Int. Symp. Inf. Theory, Toronto, ON, 6- Juy 8, pp

Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits

Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits Jon W. Wallace, Chan Chen, Michael A. Jensen School of Engineering and Science, Jacobs University Bremen Campus Ring,

More information

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu

More information

Rateless Codes for the Gaussian Multiple Access Channel

Rateless Codes for the Gaussian Multiple Access Channel Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W

More information

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:

More information

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,

More information

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN A CDMA SYSTEM Yan Zhang, Laurence B. Mistein, and Pau H. Siege Department of ECE, University of Caifornia, San Diego

More information

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver

More information

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM Performance Measures of a UWB Mutipe-Access System: DS/CDMA versus TH/PPM Aravind Kaias and John A. Gubner Dept. of Eectrica Engineering University of Wisconsin-Madison Madison, WI 53706 akaias@wisc.edu,

More information

Self-Interference Canceller for Full-Duplex Radio Relay Station Using Virtual Coupling Wave Paths

Self-Interference Canceller for Full-Duplex Radio Relay Station Using Virtual Coupling Wave Paths Sef-Interference Canceer for Fu-Dupex Radio Reay Station Using Virtua Couping Wave Paths Kazunori Hayashi Yasuo Fujishima Megumi Kaneko Hideaki Sakai Riichi Kudo and Tomoki Murakami Graduate Schoo of Informatics,

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,

More information

Space-Time Focusing Transmission in Ultra-wideband Cooperative Relay Networks

Space-Time Focusing Transmission in Ultra-wideband Cooperative Relay Networks ICUWB 2009 (September 9-11, 2009) 1 Space-Time Focusing Transmission in Utra-wideband Cooperative Reay Networks Yafei Tian and Chenyang Yang Schoo of Eectronics and Information Engineering, Beihang University

More information

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER SYSTEMS Junsung Lim, Hyung G. Myung, Kyungjin Oh and David J. Goodman Dept. of Eectrica and Computer Engineering, Poytechnic University 5 Metrotech

More information

FOR energy limited data networks, e.g., sensor networks,

FOR energy limited data networks, e.g., sensor networks, 578 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., DECEMBER 009 An Optima Power Aocation Scheme for the STC Hybrid ARQ over Energy Limited Networks Hongbo Liu, Member, IEEE, Leonid Razoumov,

More information

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar

More information

Resource Allocation via Linear Programming for Fractional Cooperation

Resource Allocation via Linear Programming for Fractional Cooperation 1 Resource Aocation via Linear Programming for Fractiona Cooperation Nariman Farsad and Andrew W Ecford Abstract In this etter, resource aocation is considered for arge muti-source, muti-reay networs empoying

More information

Copyright 2000 IEEE. IEEE Global Communications Conference (Globecom 2000), November 27 - December 1, 2000, San Francisco, California, USA

Copyright 2000 IEEE. IEEE Global Communications Conference (Globecom 2000), November 27 - December 1, 2000, San Francisco, California, USA Copyright 2000 EEE. EEE Goba Communications Conference (Gobecom 2000), November 27 - December 1, 2000, San Francisco, Caifornia, USA Persona use of this materia is permitted. owever, permission to reprint/repubish

More information

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection?

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection? Deaing with Lin Bocage in mmwave etwors: DD Reaying or Muti-beam Refection? Mingjie Feng, Shiwen Mao Dept. Eectrica & Computer Engineering Auburn University, Auburn, AL 36849-5, U.S.A. Tao Jiang Schoo

More information

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director

More information

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of

More information

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks Proceedings of SDR'11-WInnComm-Europe, 22-24 Jun 2011 Joint Optima Power Aocation and Reay Seection with Spatia Diversity in Wireess Reay Networks Md Habibu Isam 1, Zbigniew Dziong 1, Kazem Sohraby 2,

More information

A Novel Method for Doppler and DOD- DOA Jointly Estimation Based on FRFT in Bistatic MIMO Radar System

A Novel Method for Doppler and DOD- DOA Jointly Estimation Based on FRFT in Bistatic MIMO Radar System 7 Asia-Pacific Engineering and Technoogy Conference (APETC 7) ISBN: 978--6595-443- A Nove Method for Dopper and DOD- DOA Jointy Estimation Based on FRFT in Bistatic MIMO Radar System Derui Song, Li Li,

More information

Fast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System

Fast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System Fast Hybrid DF/D Architecture for OFDM in ognitive Radio System Zhu hen, Moon Ho Lee, Senior Member, EEE, hang Joo Kim 3 nstitute of nformation&ommunication, honbuk ationa University, Jeonju, 56-756,Korea

More information

BER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel

BER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel Internationa Journa of Computer ppications (0975 8887) Voume 5 No.11, Juy 011 BER Performance naysis of Cognitive Radio Physica Layer over Rayeigh fading mandeep Kaur Virk Dr. B R mbedkar Nationa Institute

More information

On the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel

On the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel On the Reationship Between Queuing Deay and Spatia Degrees of Freedom in a IO utipe Access Channe Sriram N. Kizhakkemadam, Dinesh Rajan, andyam Srinath Dept. of Eectrica Engineering Southern ethodist University

More information

Communication Systems

Communication Systems Communication Systems 1. A basic communication system consists of (1) receiver () information source (3) user of information (4) transmitter (5) channe Choose the correct sequence in which these are arranged

More information

Improving the Active Power Filter Performance with a Prediction Based Reference Generation

Improving the Active Power Filter Performance with a Prediction Based Reference Generation Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source

More information

SCHEDULING the wireless links and controlling their

SCHEDULING the wireless links and controlling their 3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,

More information

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Sateite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Jing Zhu and Sumit Roy Department of Eectrica Engineering, University of Washington Box 352500, Seatte, WA 98195, USA

More information

Performance of Single User vs. Multiuser Modulation in Wireless Multicarrier (MC) Communications

Performance of Single User vs. Multiuser Modulation in Wireless Multicarrier (MC) Communications erformance of Singe User vs. Mutiuser Moduation in Wireess Muticarrier (MC) Communications Anwaru Azim, ecturer, East West University Bangadesh Abstract-- he main objective of this paper is to compare

More information

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2 ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,

More information

Coverage and Rate Analysis for Millimeter Wave Cellular Networks

Coverage and Rate Analysis for Millimeter Wave Cellular Networks Coverage and Rate Anaysis for Miimeter Wave Ceuar Networks Tianyang Bai and Robert W. Heath, Jr. arxiv:42.643v3 cs.it 8 Oct 24 Abstract Miimeter wave mmwave) hods promise as a carrier frequency for fifth

More information

CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS

CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS Susan Joshy and A.V. Babu, Department of Eectronics & Communication Engineering, Nationa Institute

More information

Efficient Downlink Channel Reconstruction for FDD Multi-Antenna Systems

Efficient Downlink Channel Reconstruction for FDD Multi-Antenna Systems 1 Efficient Downink Channe Reconstruction for FDD Muti-Antenna Systems Yu Han, Tien-Hao Hsu, Chao-Kai Wen, Kai-Kit Wong, and Shi Jin Nationa Mobie Communications Research Laboratory, Southeast University,

More information

Pulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis

Pulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis Pused RF Signas & Frequency Hoppers Using Rea Time Spectrum Anaysis 1 James Berry Rohde & Schwarz Pused Rea Time and Anaysis Frequency Seminar Hopper Agenda Pused Signas & Frequency Hoppers Characteristics

More information

Airborne Ultrasonic Position and Velocity Measurement Using Two Cycles of Linear-Period-Modulated Signal

Airborne Ultrasonic Position and Velocity Measurement Using Two Cycles of Linear-Period-Modulated Signal Airborne Utrasonic Position and Veocity Measurement Using Two Cyces of Linear-Period-Moduated Signa Shinya Saito 1, Minoru Kuribayashi Kurosawa 1, Yuichiro Orino 1, and Shinnosuke Hirata 2 1 Department

More information

TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS

TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS Ingmar Hammerström, Jian Zhao, and Armin Wittneben Swiss Federa Institute of Technoogy (ETH)

More information

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,

More information

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W.

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W. www.ietd.org Pubished in IET Communications Received on 18th June 2009 Revised on 30th Juy 2009 ISSN 1751-8628 Cross-ayer queuing anaysis on mutihop reaying networks with adaptive moduation and coding

More information

Distributed Antenna System for Mitigating Shadowing Effect in 60 GHz WLAN

Distributed Antenna System for Mitigating Shadowing Effect in 60 GHz WLAN Distributed Antenna System for Mitigating Shadowing Effect in 60 GHz WLAN Citation for pubished version (APA): Wang, Q., Debbarma, D., Lo, A., Cao, Z., Niemegeers, I., & Heemstra, S. (2015). Distributed

More information

Sparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints

Sparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints Sparse Beamforming Design for Networ MIMO System with Per-Base-Station Bachau Constraints Binbin Dai and Wei Yu Department of Eectrica and Computer Engineering University of Toronto, Toronto, Ontario M5S

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003. Coon, J., Siew, J., Beach, MA., Nix, AR., Armour, SMD., & McGeehan, JP. (3). A comparison of MIMO-OFDM and MIMO-SCFDE in WLAN environments. In Goba Teecommunications Conference, 3 (Gobecom 3) (Vo. 6, pp.

More information

On the Relationship Between Capacity and Distance in an Underwater Acoustic Communication Channel

On the Relationship Between Capacity and Distance in an Underwater Acoustic Communication Channel On the Reationship Between Capacity and Distance in an Underwater Acoustic Communication Channe Miica Stojanovic Massachusetts Institute of Technoogy miitsa@mit.edu ABSTRACT Path oss of an underwater acoustic

More information

Project: IEEE P Working Group for Wireless Personal Area Networks N

Project: IEEE P Working Group for Wireless Personal Area Networks N Project: IEEE P802.15 Working Group for Wireess Persona Area Networks N (WPANs( WPANs) Tite: [MATLAB Simuation Program for TSV-channe mode] Date Submitted: [September 18, 2006] Source: [Hiroshi Harada,

More information

Utility-Proportional Fairness in Wireless Networks

Utility-Proportional Fairness in Wireless Networks IEEE rd Internationa Symposium on Persona, Indoor and Mobie Radio Communications - (PIMRC) Utiity-Proportiona Fairness in Wireess Networks G. Tychogiorgos, A. Gkeias and K. K. Leung Eectrica and Eectronic

More information

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks IEEE ICC 1 - Wireess Communications Symposium Best Reay Seection Using SNR and Interference Quotient for Underay Cognitive Networks Syed Imtiaz Hussain 1, Mohamed M. Abdaah 1, Mohamed-Sim Aouini 1,, Mazen

More information

Information Theoretic Radar Waveform Design for Multiple Targets

Information Theoretic Radar Waveform Design for Multiple Targets 1 Information Theoretic Radar Waveform Design for Mutipe Targets Amir Leshem and Arye Nehorai Abstract In this paper we use information theoretic approach to design radar waveforms suitabe for simutaneousy

More information

On optimizing low SNR wireless networks using network coding

On optimizing low SNR wireless networks using network coding On optimizing ow SNR wireess networks using network coding Mohit Thakur Institute for communications engineering, Technische Universität München, 80290, München, Germany. Emai: mohit.thakur@tum.de Murie

More information

A Game-theoretic Approach to Power Management in MIMO-OFDM. Ad Hoc Networks. A Dissertation. Submitted to the Faculty. Drexel University.

A Game-theoretic Approach to Power Management in MIMO-OFDM. Ad Hoc Networks. A Dissertation. Submitted to the Faculty. Drexel University. A Game-theoretic Approach to Power Management in MIMO-OFDM Ad Hoc Networks A Dissertation Submitted to the Facuty of Drexe University by Chao Liang in partia fufiment of the requirements for the degree

More information

Transmit-Diversity-Assisted Space-Shift Keying for Colocated and Distributed/Cooperative MIMO Elements

Transmit-Diversity-Assisted Space-Shift Keying for Colocated and Distributed/Cooperative MIMO Elements 2864 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL 60, NO 6, JULY 2011 Transmit-Diversity-Assisted Space-Shift Keying for Coocated and Distributed/Cooperative MIMO Eements Du Yang, Chao Xu, Student Member,

More information

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic Joint Spectrum Access and Pricing in Cognitive Radio Networks with Eastic Traffic Joceyne Eias University of Bergamo E-mai: joceyne.eias@unibg.it Fabio Martignon University of Bergamo E-mai: fabio.martignon@unibg.it

More information

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp. 702 712, June 1998 008 AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR

More information

Effect of Random Walk Phase Noise on MIMO Measurements

Effect of Random Walk Phase Noise on MIMO Measurements MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Effect of Random Wak Phase Noise on MIMO Measurements Peter Amers, Shurjee Wyne, Fredrik Tufvesson and Andreas Moisch TR25-59 Juy 25 Abstract

More information

Secrecy Outage Analysis over Correlated Composite Nakagami-m/Gamma Fading Channels

Secrecy Outage Analysis over Correlated Composite Nakagami-m/Gamma Fading Channels Secrecy Outage Anaysis over Correated Composite Nakagami-m/Gamma Fading Channes George C. Aexandropouos, Senior Member, IEEE and Kostas P. Peppas, Senior Member, IEEE arxiv:7.9v [cs.it] 3 Oct 7 Abstract

More information

Sparse Channel Estimation Based on Compressed Sensing for Massive MIMO Systems

Sparse Channel Estimation Based on Compressed Sensing for Massive MIMO Systems Sparse Channe Estimation Based on Compressed Sensing for Massive MIMO Systems Chenhao Qi, Yongming Huang, Shi Jin and Lenan Wu Schoo of Information Science and Engineering, Southeast University, Nanjing

More information

Low Delay Wind Noise Cancellation for Binaural Hearing Aids

Low Delay Wind Noise Cancellation for Binaural Hearing Aids INTER-NOISE 6 Low Deay Wind Noise Canceation for Binaura Hearing Aids Nobuhio HIRUMA ; Ryousue KOUYAMA ; Hidetoshi NAKASHIMA 3 ; Yoh-ichi FUJISAKA 4, 4 Rion Co., Ltd, Japan, 3 Nationa Institute of Technoogy,

More information

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang

More information

Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM

Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Spatia Reuse in Dense Wireess Areas: A Cross-ayer Optimization Approach via ADMM Haeh Tabrizi, Member, IEEE, Borja Peeato, Member, IEEE, Gonaz Farhadi, Member,

More information

Suppression of ISI Caused by Sampling Time Offset in IFDMA Systems

Suppression of ISI Caused by Sampling Time Offset in IFDMA Systems Suppression of ISI Caused by Samping Time Offset in IFDA Systems Aexander Arkhipov, ichae Schne German Aerospace Center (DLR), Inst. of Communications and Navigation, D-82234, Wessing, Germany. Phone/e-mai:

More information

Co-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel

Co-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel Co-channe Interference Suppression Techniques for STBC OFDM System over Douby Seective Channe Jyoti P. Patra Dept. of Eectronics and Communication Nationa Institute Of Technoogy Rourkea-769008, India E

More information

CHANNEL ESTIMATION PERFORMANCE FOR ZERO-OVERHEAD CHANNEL ACCESS IN MOBILE SENSOR NETWORKS

CHANNEL ESTIMATION PERFORMANCE FOR ZERO-OVERHEAD CHANNEL ACCESS IN MOBILE SENSOR NETWORKS CANNEL ESTIMATION PERFORMANCE FOR ZERO-OVEREAD CANNEL ACCESS IN MOBILE SENSOR NETWORKS John E. Keider, Ghassan Maaoui, Steve Gifford, and Scott Chuprun Genera Dynamics C4 Systems Scottsdae, AZ, 8557 Brian

More information

arxiv: v4 [physics.soc-ph] 31 Dec 2013

arxiv: v4 [physics.soc-ph] 31 Dec 2013 A Cascading Faiure Mode by Quantifying Interactions Junjian Qi and Shengwei Mei Department of Eectrica Engineering, Tsinghua University, Beijing, China 100084 arxiv:1301.2055v4 [physics.soc-ph] 31 Dec

More information

DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION

DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Undergraduate Research Opportunity Project (UROP ) DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Student: Nguyen, Tran Thanh Binh Schoo of Eectrica & Eectronic Engineering Nayang Technoogica University

More information

Analyzing Uplink SINR and Rate in Massive. MIMO Systems Using Stochastic Geometry

Analyzing Uplink SINR and Rate in Massive. MIMO Systems Using Stochastic Geometry Anayzing Upink SINR and Rate in Massive MIMO Systems Using Stochastic Geometry Tianyang Bai and Robert W. Heath, Jr. arxiv:5.2538v2 [cs.it] 2 Apr 26 Abstract This paper proposes a stochastic geometry framework

More information

Theoretical Analysis of Power Saving in Cognitive Radio with Arbitrary Inputs

Theoretical Analysis of Power Saving in Cognitive Radio with Arbitrary Inputs Theoretica Anaysis of Power Saving in Cognitive Radio with Arbitrary Inputs Ahmed Sohai, Mohammed A-Imari, Pei Xiao, and Barry G. Evans Abstract In Orthogona Frequency Division Mutipexing (OFDM based cognitive

More information

Optimal and Suboptimal Finger Selection Algorithms for MMSE Rake Receivers in Impulse Radio Ultra-Wideband Systems 1

Optimal and Suboptimal Finger Selection Algorithms for MMSE Rake Receivers in Impulse Radio Ultra-Wideband Systems 1 Optima and Suboptima Finger Seection Agorithms for MMSE Rake Receivers in Impuse Radio Utra-Wideband Systems Sinan Gezici, Mung Chiang, H. Vincent Poor and Hisashi Kobayashi Department of Eectrica Engineering

More information

Uplink Massive MIMO SIR Analysis: How do Antennas Scale with Users?

Uplink Massive MIMO SIR Analysis: How do Antennas Scale with Users? Upink Massive MIMO SIR Anaysis: How do Antennas Scae with Users? Tianyang Bai and Robert W. Heath, Jr. Wireess Networking and Communication Group The University of Texas at Austin 66 Guadaupe Street, C83,

More information

THE EMERGING IEEE ad wireless local area

THE EMERGING IEEE ad wireless local area 1 Suboptima Spatia Diversity Scheme for 60 Gz Miimeter-Wave WLAN Zhenyu Xiao, Member, IEEE arxiv:1511.02326v1 [cs.it] 7 Nov 2015 Abstract This etter revisits the equa-gain (EG) spatia diversity technique,

More information

FREQUENCY-DOMAIN TURBO EQUALIZATION FOR SINGLE CARRIER MOBILE BROADBAND SYSTEMS. Liang Dong and Yao Zhao

FREQUENCY-DOMAIN TURBO EQUALIZATION FOR SINGLE CARRIER MOBILE BROADBAND SYSTEMS. Liang Dong and Yao Zhao FREQUENCY-DOMAIN TURBO EQUALIZATION FOR SINGLE CARRIER MOBILE BROADBAND SYSTEMS Liang Dong and Yao Zhao Department of Eectrica and Computer Engineering Western Michigan University Kaamazoo, MI 49008 ABSTRACT

More information

IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. -, NO. -, - 1

IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. -, NO. -, - 1 IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. -, NO. -, - QuaDRiGa: A 3-D Muti-Ce Channe Mode with Time Evoution for Enabing Virtua Fied Trias Stephan Jaecke, Member, IEEE, Leszek Raschkowski, Kai

More information

Adaptive Bit and Power Allocation for Rate and Margin Maximization in V-BLAST System

Adaptive Bit and Power Allocation for Rate and Margin Maximization in V-BLAST System Revista Científica Periódica - Teecomunicações ISSN 56-338 Adaptive Bit and Power Aocation for Rate and argin aximization in V-BAST System Dror eiri and Irving Kaet Aeis Photonics, Netanya, Israe (emai:

More information

A Distributed Utility Max-Min Flow Control Algorithm

A Distributed Utility Max-Min Flow Control Algorithm A Distributed tiity Max-Min Fow Contro Agorithm Hyang-Won Lee and Song Chong Department of Eectrica Engineering and Computer Science Korea Advanced Institute of Science and Technoogy (KAIST) mshw@netsys.kaist.ac.kr,

More information

A capacity-approaching coded modulation scheme for non-coherent fading channels

A capacity-approaching coded modulation scheme for non-coherent fading channels Louisiana State University LSU Digita Commons LSU Master's Theses Graduate Schoo 008 A capacity-approaching coded moduation scheme for non-coherent fading channes Youngjeon Cho Louisiana State University

More information

Blind Multiuser Detection in Asynchronous DS-CDMA Systems over Nakagami-m Fading Channels

Blind Multiuser Detection in Asynchronous DS-CDMA Systems over Nakagami-m Fading Channels Bind Mutiuser Detection in Asynchronous DS-CDMA Systems over akagami-m Fading Channes Vinay Kumar Pamua JU Kakinada, Andhra Pradesh, India 533 003 pamuavk@yahoo.com ABSRAC his paper presents a technique

More information

Wireless Communications

Wireless Communications Wireess Communications Mutipe Access Hamid Bahrami Eectrica & Computer Engineering Communication System Bock Diagram Dupexing Dupexing: transmit and receive at the same time Exampe: teephone, how about

More information

Multiuser Detection for Out-of-Cell Cochannel Interference Mitigation in the IS 95 Downlink

Multiuser Detection for Out-of-Cell Cochannel Interference Mitigation in the IS 95 Downlink 1 Mutiuser Detection for Out-of-Ce Cochanne Interference Mitigation in the IS 95 Downink D. Richard Brown III, H. Vincent Poor, Sergio Verdú, and C. Richard Johnson, Jr. This research was supported in

More information

Wireless Communications

Wireless Communications Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve

More information

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 0.09/ACCESS.07.70008,

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication Under Channe Uncertainties: A Stabe Matching Approach Monowar Hasan, Student Member, IEEE, and Ekram Hossain, Feow, IEEE Abstract

More information

LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION

LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION Jinyu Li, Abderahman Mohamed, Geoffrey Zweig, and Yifan Gong Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 { jinyi, asamir,

More information

Capacity of Data Collection in Arbitrary Wireless Sensor Networks

Capacity of Data Collection in Arbitrary Wireless Sensor Networks This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess

More information

Hybrid Digital-Analog Joint Source Channel Coding for Broadcast Multiresolution Communications

Hybrid Digital-Analog Joint Source Channel Coding for Broadcast Multiresolution Communications 217 25th European Signa Processing Conference (EUSIPCO) Hybrid Digita-Anaog Joint Source Channe Coding for Broadcast Mutiresoution Communications O. Fresnedo, P. Suárez-Casa, L. Castedo Department of Eectronics

More information

CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI

CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI Jivisha, Gaurav Mohta, Saumya Das Siim Manipa Institute of Technoogy Emai Id- gauravmohta.officia@gmai.com; Ph No. +9 9609850304 Abstract Wi-Fi or wireess

More information

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection Distribution of ath Durations in Mobie Ad-Hoc Networks and ath Seection Richard J. La and Yijie Han Abstract We investigate the issue of path seection in mutihop wireess networks with the goa of identifying

More information

Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM

Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM Effect of Interfering Users on the Moduation Order and Code Rate for UWB Impuse-Radio Bit-Intereaved Coded M-ary PPM Ruben Merz and Jean-Yves Le Boudec EPFL, Schoo of Computer and Communication Sciences

More information

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Energy-Aware Scheduing with Quaity of Surveiance Guarantee in Wireess Sensor Networks Jaehoon Jeong, Sarah Sharafkandi, and David H.C. Du Dept. of Computer Science and Engineering, University of Minnesota

More information

Channel Estimation for SC-FDE Systems Using Frequency Domain Multiplexed Pilots

Channel Estimation for SC-FDE Systems Using Frequency Domain Multiplexed Pilots Channe Estimation for SC-FDE Systems Using Frequency Domain utipexed Piots Chan-Tong am, David D. Faconer and Forence Danio-emoine BCWS, Careton Univ., Canada K1S 5B6 Emai: {amc, ddf, fdanio@sce.careton.ca

More information

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE The 14 th Word Conference on Earthquake Engineering NEW RISK ANALYSIS ETHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE Satoru Nishikawa 1, Sei ichiro Fukushima 2 and Harumi Yashiro 3 ABSTRACT

More information

Hybrid Digital-to-Analog Beamforming for Millimeter-Wave Systems with High User Density

Hybrid Digital-to-Analog Beamforming for Millimeter-Wave Systems with High User Density Hybrid Digita-to-Anaog Beamforming for Miimeter-Wave Systems with High User Density Manish Nair, Qasim Zeeshan Ahmed and Huiing Zhu Schoo of Engineering and Digita Arts, University of Kent, Canterbury,

More information

INTERNATIONAL TELECOMMUNICATION UNION 02/4%#4)/.!'!).34 ).4%2&%2%.#%

INTERNATIONAL TELECOMMUNICATION UNION 02/4%#4)/.!'!).34 ).4%2&%2%.#% INTERNATIONAL TELECOMMUNICATION UNION )454 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU 02/4%#4)/!'!)34 )4%2&%2%#% #!,#5,!4)/ /& 6/,4!'% )$5#%$ )4/ 4%,%#/--5)#!4)/,)%3 &2/- 2!$)/ 34!4)/ "2/!$#!343!$

More information

Energy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems

Energy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems Energy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems invited paper Ahmad Asharoa, Abdukadir Ceik, Ahmed E. Kama Iowa State University ISU, Ames, Iowa, United States, Emai:

More information

Block-Level Unitary Query: Incorporating Orthogonal-like Space-time Code with Query Diversity for MIMO Backscatter RFID

Block-Level Unitary Query: Incorporating Orthogonal-like Space-time Code with Query Diversity for MIMO Backscatter RFID 1 Bock-Leve Unitary Query: Incorporating Orthogona-ike Space-time Code with Query Diversity for MIMO Backscatter RFID Chen He, Member, IEEE, Z. Jane Wang, Senior Member, IEEE, and Victor C.M. Leung, Feow,

More information

Run to Potential: Sweep Coverage in Wireless Sensor Networks

Run to Potential: Sweep Coverage in Wireless Sensor Networks Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,

More information

Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation

Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation Power Spectrum Optimization for Interference Mitigation via Iterative Function Evauation Hayssam Dahrouj, Wei Yu, Taiwen Tang, and Steve Beaudin Eectrica and Computer Engineering Dept., University of Toronto,

More information

Top Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobility Fading Channels

Top Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobility Fading Channels Top Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobiity Fading Channes Juinn-Horng Deng, Feng-Chin Hsiao, and Yi-Hsin Lin Department of Communications Engineering

More information

WIFI-BASED IMAGING FOR GPR APPLICATIONS: FUNDAMENTAL STUDY AND EXPERIMENTAL RESULTS

WIFI-BASED IMAGING FOR GPR APPLICATIONS: FUNDAMENTAL STUDY AND EXPERIMENTAL RESULTS WIFI-BASED IMAGING FOR GPR APPICATIONS: FUNDAMENTA STUDY AND EXPERIMENTA RESUTS Weike Feng *, Jean-Miche Friedt, Zhipeng Hu 3, Grigory Cherniak, and Motoyuki Sato 4 Graduate Schoo of Environmenta Studies,

More information

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access 0 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 5, NO., JUNE 007 A Low Compexity VCS Method for PAPR Reduction in Muticarrier Code Division Mutipe Access Si-Si Liu, Yue iao, Qing-Song Wen,

More information

Relays that Cooperate to Compute

Relays that Cooperate to Compute Reays that Cooperate to Compute Matthew Nokeby Rice University nokeby@rice.edu Bobak Nazer Boston University bobak@bu.edu Behnaam Aazhang Rice University aaz@rice.edu Natasha evroye University of Iinois

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication: A Message Passing Approach Monowar Hasan and Ekram Hossain arxiv:406.323v [cs.ni] 2 Jun 204 Abstract Device-to-device D2D communication

More information

R is in the unit of ma/mw or A/W. For semiconductor detectors, the value is approximately, 0.5 ma/mw.

R is in the unit of ma/mw or A/W. For semiconductor detectors, the value is approximately, 0.5 ma/mw. Light Detection Conventiona methods for the detection of ight can be categorized into photo-synthesis, photographic pate, and photoeectric effect. Photo-synthesis and photographic pate are based on ight-induced

More information

Optimum Fault Current Limiter Placement

Optimum Fault Current Limiter Placement Optimum aut urrent Limiter acement Jen-Hao Teng han-an Lu Abstract: Due to the difficuty in power network reinforcement and the interconnection of more distributed generations, faut current eve has become

More information