بحث بسيط
السجلات المعروضة 1 -- 10 من 14
Optimal cooperative cognitive relaying and spectrum access for an energy harvesting cognitive radio: Reinforcement learning approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, we consider a cognitive setting under the context of cooperative communications, where the cognitive radio (CR) user is assumed to be a self-organized relay for the network. The CR user and the primary user ...
Non-data-aided SNR estimation for QPSK modulation in AWGN channel
(
IEEE Computer Society
, 2014 , Conference Paper)
Signal-to-noise ratio (SNR) estimation is an important parameter that is required in any receiver or communication systems. It can be computed either by a pilot signal data-aided approach in which the transmitted signal ...
Robust secret key extraction from channel secondary random process
(
John Wiley and Sons Ltd
, 2016 , Conference Paper)
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
Power-optimal feedback-based random spectrum access for an energy harvesting cognitive user
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, we study and analyze cognitive radio networks in which secondary users (SUs) are equipped with energy harvesting (EH) capability. We design a random spectrum sensing and access protocol for the SU that ...
Characterization of the indoor-outdoor radio propagation channel at 2.4 GHz
(
IEEE
, 2011 , Conference Paper)
We present the site-specific signal strength measurement results for path loss, shadowing, and fading in 2.4GHz band under typical harsh environment (high temperature 4050 C and humidity 8090%). We use spectrum analyzer ...
Secret key generation based on channel and distance measurements
(
IEEE Computer Society
, 2014 , Conference Paper)
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...
Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each ...
Optimal spectrum access for a rechargeable cognitive radio user based on energy buffer state
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests ...
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Estimating the number of sources: An efficient maximization approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ...