13,937 research outputs found
Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback
Channel state information (CSI) at the transmitter is of importance to the
performance of physical layer security based on multi-antenna networks.
Specifically, CSI is not only beneficial to improve the capacity of the
legitimate channel, but also can be used to degrade the performance of the
eavesdropper channel. Thus, the secrecy rate increases accordingly. This letter
focuses on the quantitative analysis of the ergodic secrecy sum-rate in terms
of feedback amount of the CSI from the legitimate users in multiuser
multi-antenna downlink networks. Furthermore, the asymptotic characteristics of
the ergodic secrecy sum-rate in two extreme cases is investigated in some
detail. Finally, our theoretical claims are confirmed by the numerical results.Comment: 4 pages, 2 figures. In IEEE Wireless Communications Letters, 201
Skyrmion dynamics in a chiral magnet driven by periodically varying spin currents
In this work, we investigated the spin dynamics in a slab of chiral magnets
induced by an alternating (ac) spin current. Periodic trajectories of the
skyrmion in real space are discovered under the ac current as a result of the
Magnus and viscous forces, which originate from the Gilbert damping, the spin
transfer torque, and the -nonadiabatic torque effects. The results are
obtained by numerically solving the Landau-Lifshitz-Gilbert equation and can be
explained by the Thiele equation characterizing the skyrmion core motion
Spatial Resource Allocation for Spectrum Reuse in Unlicensed LTE Systems
In this paper, we study how to reuse the unlicensed spectrum in LTE-U systems
while guaranteeing harmonious coexistence between the LTE-U and Wi-Fi systems.
For a small cell with multiple antennas at the base station (SBS), some spatial
degrees of freedom (DoFs) are used to serve small cell users (SUEs) while the
rest are employed to mitigate the interference to the Wi-Fi users by applying
zero-forcing beamforming (ZFBF). As a result, the LTE-U and Wi-Fi throughput
can be balanced by carefully allocating the spatial DoFs. Due to the channel
state information (CSI) estimation and feedback errors, ZFBF cannot eliminate
the interference completely. We first analyze the residual interference among
SUEs, called intra-RAT interference, and the interference to the Wi-Fi users,
called inter-RAT interference after ZFBF, due to imperfect CSI. Based on the
analysis, we derive the throughputs of the small cell and the Wi-Fi systems,
respectively. Accordingly, a spatial DoF allocation scheme is proposed to
balance the throughput between the small cell and the Wi-Fi systems. Our
theoretical analysis and the proposed scheme are verified by simulation
results
Spatial Throughput Characterization in Cognitive Radio Networks with Threshold-Based Opportunistic Spectrum Access
This paper studies the opportunistic spectrum access (OSA) of the secondary
users in a large-scale overlay cognitive radio (CR) network. Two
threshold-based OSA schemes, namely the primary receiver assisted (PRA)
protocol and the primary transmitter assisted (PTA) protocol, are investigated.
Under the PRA/PTA protocol, a secondary transmitter (ST) is allowed to access
the spectrum only when the maximum signal power of the received beacons/pilots
sent from the active primary receivers/transmitters (PRs/PTs) is lower than a
certain threshold. To measure the resulting transmission opportunity for the
secondary users by the proposed OSA protocols, the concept of spatial
opportunity, which is defined as the probability that an arbitrary location in
the primary network is detected as a spatial spectrum hole, is introduced and
then evaluated by applying tools from stochastic geometry. Based on spatial
opportunity, the coverage (non-outage transmission) performance in the overlay
CR network is analyzed. With the obtained results of spatial opportunity and
coverage probability, we finally characterize the spatial throughput, which is
defined as the average spatial density of successful transmissions in the
primary/secondary network, under the PRA and PTA protocols, respectively.Comment: Accepted by IEEE Journal on Selected Areas in Communications,
Cognitive Radio Serie
Throughput and Delay Scaling in Supportive Two-Tier Networks
Consider a wireless network that has two tiers with different priorities: a
primary tier vs. a secondary tier, which is an emerging network scenario with
the advancement of cognitive radio technologies. The primary tier consists of
randomly distributed legacy nodes of density , which have an absolute
priority to access the spectrum. The secondary tier consists of randomly
distributed cognitive nodes of density with , which
can only access the spectrum opportunistically to limit the interference to the
primary tier. Based on the assumption that the secondary tier is allowed to
route the packets for the primary tier, we investigate the throughput and delay
scaling laws of the two tiers in the following two scenarios: i) the primary
and secondary nodes are all static; ii) the primary nodes are static while the
secondary nodes are mobile. With the proposed protocols for the two tiers, we
show that the primary tier can achieve a per-node throughput scaling of
in the above two scenarios. In the associated
delay analysis for the first scenario, we show that the primary tier can
achieve a delay scaling of
with . In the second scenario, with two mobility
models considered for the secondary nodes: an i.i.d. mobility model and a
random walk model, we show that the primary tier can achieve delay scaling laws
of and , respectively, where is the random walk
step size. The throughput and delay scaling laws for the secondary tier are
also established, which are the same as those for a stand-alone network.Comment: 13 pages, double-column, 6 figures, accepted for publication in JSAC
201
- …