بحث بسيط
السجلات المعروضة 1 -- 10 من 12
On the coexistence of a primary user with an energy harvesting secondary user: A case of cognitive cooperation
(
John Wiley and Sons Ltd
, 2016 , Article)
In this paper, we consider a cognitive scenario where an energy harvesting secondary user shares the spectrum with a primary user. The secondary source helps the primary source in delivering its undelivered packets during ...
Reinforcement learning-based decision support system for COVID-19
(
Elsevier
, 2021 , Article)
Globally, informed decision on the most effective set of restrictions for the containment of COVID-19 has been the subject of intense debates. There is a significant need for a structured dynamic framework to model and ...
Smart System to Monitor Social-Distancing During the Covid-19 Pandemic
(
Qatar University Press
, 2020 , Poster)
We introduce a smart system to track and maintain real-time physical distance between people and to warn people to any deviation from the prescribed distances. Social-distancing is an effective way of slowing infectious ...
Relay-Assisted Primary and Secondary Transmissions in Cognitive Radio Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Article)
We assume a set of cognitive relay nodes that assists both primary and secondary transmissions in a time-slotted cognitive radio networks. To regulate the channel access of the various nodes in the network, we propose an ...
Covid-19: Challenges & Perspectives
(
College of Medicine - Qatar University
, 2020 , Video)
A Virtual Conference to shed light on the QU's prominent trends and research efforts addressing Corona virus.
Analysis of In-band Full-Duplex OFDM Signals Affected by Phase Noise and I/Q Imbalance
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
The idea of the simultaneous transmission and reception of data using the same frequency is a potential candidate to be deployed in the next generation wireless communications standard 5G. The In-Band Full-Duplex (IBFD) ...
The Secure Degrees of Freedom of the MIMO BC and MIMO MAC with Multiple Unknown Eavesdroppers
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access channel with multiple antennas at the transmitters, a legitimate receiver and an unknown number of eavesdroppers each with ...
Secure Communications Using Directional Modulation
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
Limitations on the wireless communication resources (i.e., time and frequency) introduces the need for another domain that can help communication systems to match the increasing demand on high data transfer rates and quality ...
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
(
Elsevier B.V.
, 2016 , Report)
Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...
A review of mathematical model-based scenario analysis and interventions for COVID-19
(
Elsevier
, 2021 , Article)
Mathematical model-based analysis has proven its potential as a critical tool in the battle against COVID-19 by enabling better understanding of the disease transmission dynamics, deeper analysis of the cost-effectiveness ...