Search
Now showing items 1-10 of 23
Centralized and Distributed Cognitive Relay-Selection Schemes for SWIPT Cognitive Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
We investigate the model of a single primary-transceiver pair with multiple secondary-transceiver pairs. The secondary pairs can act as relays for the primary transmitter enabling access to its channel resources. Each ...
Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey and Future Directions
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Unmanned aerial vehicles (UAVs) have recently rapidly grown to facilitate a wide range of innovative applications that can fundamentally change the way cyber-physical systems (CPSs) are designed. CPSs are a modern generation ...
A Deep Reinforcement Learning Framework for Data Compression in Uplink NOMA-SWIPT Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
<comment< Non-orthogonal multiple access (NOMA) shall play an important role in the current and foreseeable design of 5G and beyond networks. NOMA allows multiple users to share the same time-frequency ...
Optimal cooperative cognitive relaying and spectrum access for an energy harvesting cognitive radio: Reinforcement learning approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, we consider a cognitive setting under the context of cooperative communications, where the cognitive radio (CR) user is assumed to be a self-organized relay for the network. The CR user and the primary user ...
Non-data-aided SNR estimation for QPSK modulation in AWGN channel
(
IEEE Computer Society
, 2014 , Conference Paper)
Signal-to-noise ratio (SNR) estimation is an important parameter that is required in any receiver or communication systems. It can be computed either by a pilot signal data-aided approach in which the transmitted signal ...
Robust secret key extraction from channel secondary random process
(
John Wiley and Sons Ltd
, 2016 , Conference Paper)
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
Deep Reinforcement Learning Algorithm for Smart Data Compression under NOMA-Uplink Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
One of the highly promising radio access strategies for enhancing performance in the next generation cellular communications is non-orthogonal multiple access (NOMA). NOMA offers a number of advantages including better ...
Power-optimal feedback-based random spectrum access for an energy harvesting cognitive user
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, we study and analyze cognitive radio networks in which secondary users (SUs) are equipped with energy harvesting (EH) capability. We design a random spectrum sensing and access protocol for the SU that ...
Characterization of the indoor-outdoor radio propagation channel at 2.4 GHz
(
IEEE
, 2011 , Conference Paper)
We present the site-specific signal strength measurement results for path loss, shadowing, and fading in 2.4GHz band under typical harsh environment (high temperature 4050 C and humidity 8090%). We use spectrum analyzer ...
Secret key generation based on channel and distance measurements
(
IEEE Computer Society
, 2014 , Conference Paper)
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...