بحث بسيط
السجلات المعروضة 21 -- 30 من 30
Secure multiple-users transmission using multi-path directional modulation
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate ...
On the Higher Order Statistics of the Channel Capacity in Dispersed Spectrum Cognitive Radio Systems Over Generalized Fading Channels
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Article)
This work is devoted to the study of dispersed spectrum cognitive radio (CR) systems over independent and nonidentically distributed (i.n.i.d.) generalized fading channels. More specifically, this is performed in terms of ...
Analysis of In-band Full-Duplex OFDM Signals Affected by Phase Noise and I/Q Imbalance
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
The idea of the simultaneous transmission and reception of data using the same frequency is a potential candidate to be deployed in the next generation wireless communications standard 5G. The In-Band Full-Duplex (IBFD) ...
The Secure Degrees of Freedom of the MIMO BC and MIMO MAC with Multiple Unknown Eavesdroppers
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access channel with multiple antennas at the transmitters, a legitimate receiver and an unknown number of eavesdroppers each with ...
Secure Communications Using Directional Modulation
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
Limitations on the wireless communication resources (i.e., time and frequency) introduces the need for another domain that can help communication systems to match the increasing demand on high data transfer rates and quality ...
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
(
Elsevier B.V.
, 2016 , Report)
Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...
On dual peak detection UWB receivers in noise and interference dominated environments
(
Elsevier GmbH
, 2016 , Article)
We propose the use of a non-coherent dual peak detection architecture for ultra wideband (UWB) receivers. To benchmark our proposed architecture, the performance of non-coherent UWB receivers based on single peak, dual ...
A novel peak search & save cyclostationary feature detection algorithm
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Spectrum sensing is a key task in any cognitive radio network. On the other hand, a literature survey in this topic shows a lack of implementation and testbeds for spectrum sensing techniques. In this paper, we plot the ...
Underlay cognitive radio: What is the impact of carrier aggregation and relaying on throughput?
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
In this paper, we investigate joint relay selection and optimal power allocation, as a means to maximize the achievable rate of an underlay cooperative cognitive radio with carrier aggregation, taking into account the ...
Protocol design and stability analysis of cooperative cognitive radio users
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
A single cognitive radio transmitter-receiver pair shares the spectrum with two primary users communicating with their respective receivers. Each primary user has a local traffic queue, whereas the cognitive user has three ...