19 research outputs found

    Enhancing physical layer security of cognitive radio transceiver via chaotic OFDM

    Get PDF
    Due to the enormous potential of improving the spectral utilization by using Cognitive Radio (CR), designing adaptive access system and addressing its physical layer security are the most important and challenging issues in CR networks. Since CR transceivers need to transmit over multiple non-contiguous frequency holes, multi-carrier based system is one of the best candidates for CR's physical layer design. In this paper, we propose a combined chaotic scrambling (CS) and chaotic shift keying (CSK) scheme in Orthogonal Frequency Division Multiplexing (OFDM) based CR to enhance its physical layer security. By employing chaos based third order Chebyshev map which allows optimum bit error rate (BER) performance of CSK modulation, the proposed combined scheme outperforms the traditional OFDM system in overlay scenario with Rayleigh fading channel. Importantly, with two layers of encryption based on chaotic scrambling and CSK modulation, large key size can be generated to resist any brute-force attack, leading to a significantly improved level of security

    Enhancing secrecy rate in cognitive radio networks via multilevel Stackelberg game

    Get PDF
    In this letter, physical layer (PHY) security is investigated for both primary and secondary transmissions of a cognitive radio network (CRN) that is in danger of malicious attempt by an eavesdropper (ED). In our proposed system, the secondary transmitter (ST) is acted as a trusted relay (TR) for primary transmission and the PHY security is facilitated by the cooperation between the primary transmitter (PT) and the ST using the multilevel Stackelberg game. In particular, we formulate and solve the optimization problem of maximizing secrecy rates in different phases of primary and secondary transmissions. Finally, numerical examples are provided to demonstrate that the spectrum leasing based on trading secondary access for cooperation is a promising framework for enhancing secrecy rate in CRNs

    Enhancing secrecy rate in cognitive radio networks via stackelberg game

    Get PDF
    In this paper, a game theory based cooperation scheme is investigated to enhance the physical layer security in both primary and secondary transmissions of a cognitive radio network (CRN). In CRNs, the primary network may decide to lease its own spectrum for a fraction of time to the secondary nodes in exchange of appropriate remuneration. We consider the secondary transmitter node as a trusted relay for primary transmission to forward primary messages in a decode-and-forward (DF) fashion and, at the same time, allows part of its available power to be used to transmit artificial noise (i.e., jamming signal) to enhance primary and secondary secrecy rates. In order to allocate power between message and jamming signals, we formulate and solve the optimization problem for maximizing the secrecy rates under malicious attempts from EDs. We then analyse the cooperation between the primary and secondary nodes from a game-theoretic perspective where we model their interaction as a Stackelberg game with a theoretically proved and computed Stackelberg equilibrium. We show that the spectrum leasing based on trading secondary access for cooperation by means of relay and jammer is a promising framework for enhancing security in CRNs

    Kurdish Dialects and Neighbor Languages Automatic Recognition

    Get PDF
    Dialect recognition is one of the most hot topics in the speech analysis area. In this study a system for dialect and language recognition is developed using phonetic and a style based features. The study suggests a new set of feature using one-dimensional LBP feature.  The results show that the proposed LBP set of feature is useful to improve dialect and language recognition accuracy. The acquired data involved in this study are three Kurdish dialects (Sorani, Badini and Hawrami) with three neighbor languages (Arabic, Persian and Turkish). The study proposed a new method to interpret the closeness of the Kurdish dialects and their neighbor languages using confusion matrix and a non-metric multi-dimensional visualization technique. The result shows that the Kurdish dialects can be clustered and linearly separated from the neighbor languages

    Clinical pattern of ocular toxoplasmosis treated in a referral centre in Serbia

    Get PDF
    Purpose To analyze the clinical pattern of ocular toxoplasmosis (OT) in a referral centre in Serbia. Patients and methods The medical records of consecutive patients admitted for OT to the single referral centre for uveitis in Serbia between 2006 and 2010 were retrospectively analyzed. OT was diagnosed on the basis of typical fundus lesions and positive serology for Toxoplasma. Results In a total of 457 uveitis patients, OT was the third leading cause, with 59 patients (12.9%). Most OT cases (73%) were monocular. An active primary retinal lesion was observed in 36% and recurrent OT in 64% patients. Localization of lesions was central/paracentral (44%), juxtapapillar (27%), peripheral (19%), and multifocal (10%). Other ocular manifestations of inflammation included vitritis (44%), anterior uveitis (19%), and retinal vasculitis (10%). Complications included choroidal neovascularization in two and exudative retinal detachment with cataract, glaucoma, and cystoid macular oedema in one patient each. The detection of Toxoplasma-specific IgM antibodies in a single patient indicates a low rate of OT concomitant with acute infection. After treatment, the mean best-corrected visual acuity (BCVA) increased significantly. However, 14 (24%) patients ended up legally blind in the affected eye, of which 2 (3%) with bilateral blindness, all with a very poor BCVA (0.047 +/- 0.055) at presentation. Visual impairment and treatment outcome were both associated with central localization of lesions (P lt 0.0001 and P = 0.006, respectively). Conclusion OT is a significant cause of posterior uveitis in Serbia. Patients should be aware of the recurring nature of OT and react immediately if symptoms occur. Eye (2012) 26, 723-728; doi: 10.1038/eye.2012.20; published online 24 February 201

    The C-Terminal Domain of the Arabinosyltransferase Mycobacterium tuberculosis EmbC Is a Lectin-Like Carbohydrate Binding Module

    Get PDF
    The D-arabinan-containing polymers arabinogalactan (AG) and lipoarabinomannan (LAM) are essential components of the unique cell envelope of the pathogen Mycobacterium tuberculosis. Biosynthesis of AG and LAM involves a series of membrane-embedded arabinofuranosyl (Araf) transferases whose structures are largely uncharacterised, despite the fact that several of them are pharmacological targets of ethambutol, a frontline drug in tuberculosis therapy. Herein, we present the crystal structure of the C-terminal hydrophilic domain of the ethambutol-sensitive Araf transferase M. tuberculosis EmbC, which is essential for LAM synthesis. The structure of the C-terminal domain of EmbC (EmbCCT) encompasses two sub-domains of different folds, of which subdomain II shows distinct similarity to lectin-like carbohydrate-binding modules (CBM). Co-crystallisation with a cell wall-derived di-arabinoside acceptor analogue and structural comparison with ligand-bound CBMs suggest that EmbCCT contains two separate carbohydrate binding sites, associated with subdomains I and II, respectively. Single-residue substitution of conserved tryptophan residues (Trp868, Trp985) at these respective sites inhibited EmbC-catalysed extension of LAM. The same substitutions differentially abrogated binding of di- and penta-arabinofuranoside acceptor analogues to EmbCCT, linking the loss of activity to compromised acceptor substrate binding, indicating the presence of two separate carbohydrate binding sites, and demonstrating that subdomain II indeed functions as a carbohydrate-binding module. This work provides the first step towards unravelling the structure and function of a GT-C-type glycosyltransferase that is essential in M. tuberculosis. Author Summary Top Tuberculosis (TB), an infectious disease caused by the bacillus Mycobacterium tuberculosis, burdens large swaths of the world population. Treatment of active TB typically requires administration of an antibiotic cocktail over several months that includes the drug ethambutol. This front line compound inhibits a set of arabinosyltransferase enzymes, called EmbA, EmbB and EmbC, which are critical for the synthesis of arabinan, a vital polysaccharide in the pathogen's unique cell envelope. How precisely ethambutol inhibits arabinosyltransferase activity is not clear, in part because structural information of its pharmacological targets has been elusive. Here, we report the high-resolution structure of the C-terminal domain of the ethambutol-target EmbC, a 390-amino acid fragment responsible for acceptor substrate recognition. Combining the X-ray crystallographic analysis with structural comparisons, site-directed mutagenesis, activity and ligand binding assays, we identified two regions in the C-terminal domain of EmbC that are capable of binding acceptor substrate mimics and are critical for activity of the full-length enzyme. Our results begin to define structure-function relationships in a family of structurally uncharacterised membrane-embedded glycosyltransferases, which are an important target for tuberculosis therapy

    A novel chaos based cost function for power control of cognitive radio networks

    No full text
    The game theoretic approach has been recently considered as potential solutions for power control in cognitive radio network (CRNs). It is well known that a critical issue in applying game theory is the selection of its proper cost function. In this letter, we introduce a new chaos based cost function to design power control algorithm and analyse the dynamic spectrum sharing issue in the uplink of cellular CRNs. Particularly, for secondary users as the game players in underlay scenarios, we define utility/cost functions taking into account the interference from and the interference tolerance of the primary users. We prove the existence of the Nash equilibrium in this power control game, leading to significantly lower power consumption and relatively fast convergence rate when compared to the other existing game algorithms
    corecore