6,471 research outputs found

    Secrecy Wireless Information and Power Transfer in OFDMA Systems

    Full text link
    In this paper, we consider simultaneous wireless information and power transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA) systems with the coexistence of information receivers (IRs) and energy receivers (ERs). The IRs are served with best-effort secrecy data and the ERs harvest energy with minimum required harvested power. To enhance physical-layer security and yet satisfy energy harvesting requirements, we introduce a new frequency-domain artificial noise based approach. We study the optimal resource allocation for the weighted sum secrecy rate maximization via transmit power and subcarrier allocation. The considered problem is non-convex, while we propose an efficient algorithm for solving it based on Lagrange duality method. Simulation results illustrate the effectiveness of the proposed algorithm as compared against other heuristic schemes.Comment: To appear in Globecom 201

    Fermi Large Area Telescope observations of the supernova remnant HESS J1731-347

    Full text link
    Context: HESS J1731-347 has been identified as one of the few TeV-bright shell-type supernova remnants (SNRs). These remnants are dominated by nonthermal emission, and the nature of TeV emission has been continuously debated for nearly a decade. Aims: We carry out the detailed modeling of the radio to gamma-ray spectrum of HESS J1731-347 to constrain the magnetic field and energetic particles sources, which we compare with those of the other TeV-bright shell-type SNRs explored before. Methods: Four years of data from Fermi Large Area Telescope (LAT) observations for regions around this remnant are analyzed, leading to no detection correlated with the source discovered in the TeV band. The Markov Chain Monte Carlo method is used to constrain parameters of one-zone models for the overall emission spectrum. Results: Based on the 99.9% upper limits of fluxes in the GeV range, one-zone hadronic models with an energetic proton spectral slope greater than 1.8 can be ruled out, which favors a leptonic origin for the gamma-ray emission, making this remnant a sibling of the brightest TeV SNR RX J1713.7-3946, the Vela Junior SNR RX J0852.0-4622, and RCW 86. The best-fit leptonic model has an electron spectral slope of 1.8 and a magnetic field of about 30 muG, which is at least a factor of 2 higher than those of RX J1713.7-3946 and RX J0852.0-4622, posing a challenge to the distance estimate and/or the energy equipartition between energetic electrons and the magnetic field of this source. A measurement of the shock speed will address this challenge and has implications on the magnetic field evolution and electron acceleration driven by shocks of SNRs.Comment: 7 pages, 3 fogures, A&A in pres

    Pentaquark states with the QQQqqˉQQQq\bar{q} configuration in a simple model

    Full text link
    We discuss the mass splittings for the SS-wave triply heavy pentaquark states with the QQQqqˉQQQq\bar{q} (Q=b,c;q=u,d,s)(Q=b,c;q=u,d,s) configuration which is a mirror structure of QQˉqqqQ\bar{Q}qqq. The latter configuration is related with the nature of Pc(4380)P_c(4380) observed by the LHCb Collaboration. The considered pentaquark masses are roughly estimated with a simple method. One finds that such states are probably not narrow even if they do exist. This leaves room for molecule interpretation for a state around the low-lying threshold of a doubly heavy baryon and a heavy-light meson, e.g. ΞccD\Xi_{cc}D, if it were observed. As a by product, we conjecture that upper limits for the masses of the conventional triply heavy baryons can be determined by the masses of the conventional doubly heavy baryons.Comment: 19 pages, 1 figure, 10 tables; Version accepted by Eur. Phys. J.

    Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay

    Full text link
    This paper studies the secure beamforming design in a multiple-antenna three-node system where two source nodes exchange messages with the help of an untrusted relay node. The relay acts as both an essential signal forwarder and a potential eavesdropper. Both two-phase and three-phase two-way relay strategies are considered. Our goal is to jointly optimize the source and relay beamformers for maximizing the secrecy sum rate of the two-way communications. We first derive the optimal relay beamformer structures. Then, iterative algorithms are proposed to find source and relay beamformers jointly based on alternating optimization. Furthermore, we conduct asymptotic analysis on the maximum secrecy sum-rate. Our analysis shows that when all transmit powers approach infinity, the two-phase two-way relay scheme achieves the maximum secrecy sum rate if the source beamformers are designed such that the received signals at the relay align in the same direction. This reveals an important advantage of signal alignment technique in against eavesdropping. It is also shown that if the source powers approach zero the three-phase scheme performs the best while the two-phase scheme is even worse than direct transmission. Simulation results have verified the efficiency of the secure beamforming algorithms as well as the analytical findings.Comment: 10 figures, Submitted to IEEE Transactions on Signal Processin
    • …
    corecore