Search
Now showing items 51-60 of 97
DSA-based energy efficient cellular networks: Integration with the smart grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Smart Grid (SG)-aware cellular networks are expected to decrease their energy consumption and consequently decrease the global carbon emissions. At the same time, cellular operators are required to meet the end-user ...
Relay selection schemes to minimise outage in wireless powered communication networks
(
Institution of Engineering and Technology
, 2016 , Article)
In this study, the authors discuss relay selection schemes with the objective to minimise outage probability for a network consisting of a single source, multiple relays and a single destination. The relays are powered by ...
Simulating drone-be-gone: Agile low-cost cyber-physical UAV Testbed (Demonstration)
(
International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS)
, 2016 , Conference Paper)
In this paper, we demonstrate Drone-Be-Gone (DbeG): a general-purpose, inexpensive, and agile UAV Cyber-Physical System (CPS) testbed. We implement on our testbed 2-D vision-based localization within 5 cm precision, ...
A BCI m-Learning System
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
Mobile learning can help in evolving students learning strength and comprehension skills. A connection is required to enable such devices communicate between each other. Brain-Computer Interface (BCI) can read brain signals ...
Energy Efficient Antenna Selection for a MIMO Relay Using RF Energy Harvesting
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
Due to rapid growth in traffic demands and the number of subscribers, the transmit energy consumption becomes critical, both environmentally and economically. Increasing energy efficiency for wireless networks is the main ...
The Secure Degrees of Freedom of the MIMO BC and MIMO MAC with Multiple Unknown Eavesdroppers
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access channel with multiple antennas at the transmitters, a legitimate receiver and an unknown number of eavesdroppers each with ...
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
(
Elsevier B.V.
, 2016 , Report)
Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...
Multi-Agent Reinforcement Learning for Network Selection and Resource Allocation in Heterogeneous Multi-RAT Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
The rapid production of mobile devices along with the wireless applications boom is continuing to evolve daily. This motivates the exploitation of wireless spectrum using multiple Radio Access Technologies (multi-RAT) and ...
3-D Stochastic Geometry-Based Modeling and Performance Analysis of Efficient Security Enhancement Scheme for IoT Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Internet of Things (IoT) systems are becoming core building blocks for different services and applications supporting every day's life. The heterogeneous nature of IoT devices and the complex use scenarios make it hard to ...
Pervasive AI for IoT applications: A Survey on Resource-efficient Distributed Artificial Intelligence
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Artificial intelligence (AI) has witnessed a substantial breakthrough in a variety of Internet of Things (IoT) applications and services, spanning from recommendation systems and speech processing applications to robotics ...