Search
Now showing items 21-30 of 48
On Channel Selection for Carrier Aggregation Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
In this paper, the problem of sub-channel selection for carrier aggregation (CA) systems is examined. CA enables the achievement of high data rate links via simultaneous transmissions over multiple component carriers. A ...
Centralized and Distributed Cognitive Relay-Selection Schemes for SWIPT Cognitive Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
We investigate the model of a single primary-transceiver pair with multiple secondary-transceiver pairs. The secondary pairs can act as relays for the primary transmitter enabling access to its channel resources. Each ...
Secret key generation based on AoA estimation for low SNR conditions
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ...
Mean squared error analysis for OFDMA signals under joint Tx/Rx IQ imbalance
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
In this paper, a normalized mean squared error (NMSE) expression is derived for an orthogonal frequency division multiple access link under the effects of joint transmitter (Tx) and receiver (Rx) in-phase/quadrature imbalance ...
On spectrum sharing between energy harvesting cognitive radio users and primary users
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests ...
Secret key generation based on channel and distance measurements
(
IEEE Computer Society
, 2014 , Conference Paper)
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...
Estimating the number of sources: An efficient maximization approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ...
Proactive power allocation and caching node selection for regular service guarantees
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
This paper studies the potential of proactive resource allocation to prolong the communication sessions in networks with limited energy budgets and stringent quality-of-service (QoS) requirement, particularly a regular ...
Power-optimal feedback-based random spectrum access for an energy harvesting cognitive user
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, we study and analyze cognitive radio networks in which secondary users (SUs) are equipped with energy harvesting (EH) capability. We design a random spectrum sensing and access protocol for the SU that ...
Secure mHealth IoT data transfer from the patient to the hospital: A three-tier approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without ...