5 research outputs found
Analytic solutions to a Marcum Q-function-based integral and application in energy detection of unknown signals over multipath fading channels
This work presents analytic solutions for a useful integral in wireless
communications, which involves the Marcum function in combination with an
exponential function and arbitrary power terms. The derived expressions have a
rather simple algebraic representation which renders them convenient both
analytically and computationally. Furthermore, they can be useful in wireless
communications and particularly in the context of cognitive radio
communications and radar systems, where this integral is often encountered. To
this end, we derive novel expressions for the probability of detection in
energy detection based spectrum sensing over fading channels.
These expressions are given in closed-form and are subsequently employed in
analyzing the effects of generalised multipath fading conditions in cognitive
radio systems. As expected, it is shown that the detector is highly dependent
upon the severity of fading conditions as even slight variation of the fading
parameters affect the corresponding performance significantly.Comment: Latest/Preprint Versio
Security Improvement for Energy Harvesting based Overlay Cognitive Networks with Jamming-Assisted Full-Duplex Destinations
This work investigates the secrecy capability of energy harvesting based overlay cognitive networks (EHOCNs). To this end, we assume that a message by a licensed transmitter is relayed by an unlicensed sender. Critically, the unlicensed sender uses energy harvested from licensed signals, enhancing the overall energy efficiency and maintaining the integrity of licensed communications. To secure messages broadcast by the unlicensed sender against the wire-tapper, full-duplex destinations - unlicensed recipient and licensed receiver - jam the eavesdropper at the same time they receive signals from the unlicensed sender. To this effect, we derive closed-form formulas for the secrecy outage probability, which then quantify the security performance of both unlicensed and licensed communications for EHOCNs with jamming-assisted full-duplex destinations, namely EHOCNwFD. In addition, optimum operating parameters are established, which can serve as essential design guidelines of such systems.acceptedVersionPeer reviewe
Handbook of Special Functions: Derivatives, Integrals, Series and Other Formulas
Includes bibliographical references (p. 669-672) and index