Search
Now showing items 1-10 of 17
Optimal cooperative cognitive relaying and spectrum access for an energy harvesting cognitive radio: Reinforcement learning approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, we consider a cognitive setting under the context of cooperative communications, where the cognitive radio (CR) user is assumed to be a self-organized relay for the network. The CR user and the primary user ...
Non-data-aided SNR estimation for QPSK modulation in AWGN channel
(
IEEE Computer Society
, 2014 , Conference Paper)
Signal-to-noise ratio (SNR) estimation is an important parameter that is required in any receiver or communication systems. It can be computed either by a pilot signal data-aided approach in which the transmitted signal ...
Robust secret key extraction from channel secondary random process
(
John Wiley and Sons Ltd
, 2016 , Conference Paper)
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
Deep Reinforcement Learning Algorithm for Smart Data Compression under NOMA-Uplink Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
One of the highly promising radio access strategies for enhancing performance in the next generation cellular communications is non-orthogonal multiple access (NOMA). NOMA offers a number of advantages including better ...
Power-optimal feedback-based random spectrum access for an energy harvesting cognitive user
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, we study and analyze cognitive radio networks in which secondary users (SUs) are equipped with energy harvesting (EH) capability. We design a random spectrum sensing and access protocol for the SU that ...
Characterization of the indoor-outdoor radio propagation channel at 2.4 GHz
(
IEEE
, 2011 , Conference Paper)
We present the site-specific signal strength measurement results for path loss, shadowing, and fading in 2.4GHz band under typical harsh environment (high temperature 4050 C and humidity 8090%). We use spectrum analyzer ...
Secret key generation based on channel and distance measurements
(
IEEE Computer Society
, 2014 , Conference Paper)
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...
Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each ...
Optimal spectrum access for a rechargeable cognitive radio user based on energy buffer state
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests ...
Deep Learning for RF-Based Drone Detection and Identification: A Multi-Channel 1-D Convolutional Neural Networks Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Commercial unmanned aerial vehicles, or drones, are getting increasingly popular in the last few years. The fact that these drones are highly accessible to public may bring a range of security and technical issues to ...