banner

Filter by

Achievable secrecy rate regions for the two-way wiretap channel

The two-way wiretap channel is considered in this paper. Two legitimate users, Alice and Bob, wish to exchange messages securely in the presence of a passive eavesdropper Eve. In the full-duplex scenario, where each node can transmit and receive simultaneously, new achievable secrecy rate regions are obtained based on the idea of allowing the two users to jointly optimize their channel prefixing

Software and Communications

Joint power and rate scheduling for cognitive multi-access networks with imperfect sensing

A cognitive multi-access network in which a primary user and a secondary user transmit to a common receiver is considered. The secondary user senses the channel at the beginning of each time slot to determine whether the primary user is active or idle. The sensing is not perfect; hence, the secondary user can miss the detection of an active primary user or erroneously declare an idle primary user

Software and Communications

Stability analysis of an ordered cognitive multiple-access protocol

We investigate an ordered-access protocol for cognitive radios. The primary user (PU) operates in a time-slotted fashion and starts transmitting at the beginning of the time slot if its queue is nonempty. The secondary users, depending on their queues and spectrum sensing results, may start transmitting at times τ, 2τ , 3τ relative to the beginning of the time slot, where τ is the sensing duration

Software and Communications

A novel stochastic geometrical model for wideband MIMO-V2V channels

In this paper, we present a novel wideband multiple-input multiple-output Vehicle-to-Vehicle channel model. The proposed channel model is derived using the geometrical elliptical scattering approach. In order to emulate the appearance and disappearance of scatterers (vehicles, terrain, roadside units, etc.) in the environment, we associate a persistence process with each physical scatterer in the

Software and Communications

Cognitive radio transmission strategies for primary erasure channels

A fundamental problem in cognitive radio systems is that the secondary user is ignorant of the primary channel state and the interference it inflicts on the primary license holder. We consider a secondary user that can eavesdrop on the ACK/NACK Automatic Repeat reQuest (ARQ) fed back from the primary receiver to the primary transmitter. Assuming the primary channel states follow a Markov chain

Software and Communications

Optimal selection of spectrum sensing duration for an energy harvesting cognitive radio

In this paper, we consider a time-slotted cognitive radio (CR) setting with buffered and energy harvesting primary and CR users. At the beginning of each time slot, the CR user probabilistically chooses the spectrum sensing duration from a predefined set. If the primary user (PU) is sensed to be inactive, the CR user accesses the channel immediately. The CR user optimizes the sensing duration

Software and Communications

Nuzzer: A large-scale device-free passive localization system for wireless environments

The widespread usage of WLANs and mobile devices has fostered the interest in localization systems for wireless environments. The majority of research in the context of wireless-based localization systems has focused on device-based active localization, in which devices are attached to tracked entities. Recently, device-free passive localization (DfP) has been proposed where the tracked entity is

Software and Communications

On the mathematical modeling of series and parallel memcapacitors

Recently, Memristive elements such as memristor, memcapacitor and meminductors have become very attractive components in many applications, due to its unique behavior which can not be obtained using the other conventional elements. This paper discusses the analytical analysis of two memcapacitors connected in series and in parallel taking the effect of mismatch in mobility factor and polarity of

Circuit Theory and Applications

A novel 10-Bit high-throughput two-stage TDC with reduced power and improved linearity

This paper introduces a new architecture that improves the throughput of the two-stage Time to Digital Converter (TDC). An oscillator-based TDC is used for conversion. The time residue from the first stage is generated directly after the stop signal is asserted and saved in the form of phase-shift between two oscillating signals. Instead of using two stages, an asynchronous control block is

Circuit Theory and Applications

Phytosynthesis of Au, Ag, and Au-Ag bimetallic nanoparticles using aqueous extract of sago pondweed (Potamogeton pectinatus L.)

A green and facile method for the synthesis of Au, Ag, and Au-Ag bimetallic nanoparticles was developed using the aqueous extract of sago pondweed (Potamogeton pectinatus L.). Size, morphology, crystallinity, composition, capping layer, and stability of the synthesized nanoparticles were all investigated. The effect of the synthesis variables on the nanoparticles was also studied. Results showed

Energy and Water