8,122 research outputs found
Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones
This paper studies the secrecy performance of a wireless network (primary
network) overlaid with an ambient RF energy harvesting IoT network (secondary
network). The nodes in the secondary network are assumed to be solely powered
by ambient RF energy harvested from the transmissions of the primary network.
We assume that the secondary nodes can eavesdrop on the primary transmissions
due to which the primary network uses secrecy guard zones. The primary
transmitter goes silent if any secondary receiver is detected within its guard
zone. Using tools from stochastic geometry, we derive the probability of
successful connection of the primary network as well as the probability of
secure communication. Two conditions must be jointly satisfied in order to
ensure successful connection: (i) the SINR at the primary receiver is above a
predefined threshold, and (ii) the primary transmitter is not silent. In order
to ensure secure communication, the SINR value at each of the secondary nodes
should be less than a predefined threshold. Clearly, when more secondary nodes
are deployed, more primary transmitters will remain silent for a given guard
zone radius, thus impacting the amount of energy harvested by the secondary
network. Our results concretely show the existence of an optimal deployment
density for the secondary network that maximizes the density of nodes that are
able to harvest sufficient amount of energy. Furthermore, we show the
dependence of this optimal deployment density on the guard zone radius of the
primary network. In addition, we show that the optimal guard zone radius
selected by the primary network is a function of the deployment density of the
secondary network. This interesting coupling between the two networks is
studied using tools from game theory. Overall, this work is one of the few
concrete works that symbiotically merge tools from stochastic geometry and game
theory
Tight Lower Bounds on the Contact Distance Distribution in Poisson Hole Process
In this letter, we derive new lower bounds on the cumulative distribution
function (CDF) of the contact distance in the Poisson Hole Process (PHP) for
two cases: (i) reference point is selected uniformly at random from
independently of the PHP, and (ii) reference point is located at
the center of a hole selected uniformly at random from the PHP. While one can
derive upper bounds on the CDF of contact distance by simply ignoring the
effect of holes, deriving lower bounds is known to be relatively more
challenging. As a part of our proof, we introduce a tractable way of bounding
the effect of all the holes in a PHP, which can be used to study other
properties of a PHP as well.Comment: To appear in IEEE Wireless Communications Letter
Joint Uplink and Downlink Coverage Analysis of Cellular-based RF-powered IoT Network
Ambient radio frequency (RF) energy harvesting has emerged as a promising
solution for powering small devices and sensors in massive Internet of Things
(IoT) ecosystem due to its ubiquity and cost efficiency. In this paper, we
study joint uplink and downlink coverage of cellular-based ambient RF energy
harvesting IoT where the cellular network is assumed to be the only source of
RF energy. We consider a time division-based approach for power and information
transmission where each time-slot is partitioned into three sub-slots: (i)
charging sub-slot during which the cellular base stations (BSs) act as RF
chargers for the IoT devices, which then use the energy harvested in this
sub-slot for information transmission and/or reception during the remaining two
sub-slots, (ii) downlink sub-slot during which the IoT device receives
information from the associated BS, and (iii) uplink sub-slot during which the
IoT device transmits information to the associated BS. For this setup, we
characterize the joint coverage probability, which is the joint probability of
the events that the typical device harvests sufficient energy in the given time
slot and is under both uplink and downlink signal-to-interference-plus-noise
ratio (SINR) coverage with respect to its associated BS. This metric
significantly generalizes the prior art on energy harvesting communications,
which usually focused on downlink or uplink coverage separately. The key
technical challenge is in handling the correlation between the amount of energy
harvested in the charging sub-slot and the information signal quality (SINR) in
the downlink and uplink sub-slots. Dominant BS-based approach is developed to
derive tight approximation for this joint coverage probability. Several system
design insights including comparison with regularly powered IoT network and
throughput-optimal slot partitioning are also provided
Classical and quantum quasi-free position dependent mass; P\"oschl-Teller and ordering-ambiguity
We argue that the classical and quantum mechanical correspondence may play a
basic role in the fixation of the ordering-ambiguity parameters. We use
quasi-free position-dependent masses in the classical and quantum frameworks.
The effective P\"oschl-Teller model is used as a manifested reference potential
to elaborate on the reliability of the ordering-ambiguity parameters available
in the literature.Comment: 10 page
Non-Hermitian von Roos Hamiltonian's -weak-pseudo-Hermiticity, isospectrality and exact solvability
A complexified von Roos Hamiltonian is considered and a Hermitian first-order
intertwining differential operator is used to obtain the related position
dependent mass -weak-pseudo-Hermitian Hamiltonians. Using a
Liouvillean-type change of variables, the -weak-pseudo-Hermitian von Roos
Hamiltonians H(x) are mapped into the traditional Schrodinger Hamiltonian form
H(q), where exact isospectral correspondence between H(x) and H(q) is obtained.
Under a user-friendly position dependent mass settings, it is observed that for
each exactly-solvable -weak-pseudo-Hermitian reference-Hamiltonian
H(q)there is a set of exactly-solvable -weak-pseudo-Hermitian isospectral
target-Hamiltonians H(x). A non-Hermitian PT-symmetric Scarf II and a
non-Hermitian periodic-type PT-symmetric Samsonov-Roy potentials are used as
reference models and the corresponding -weak-pseudo-Hermitian isospectral
target-Hamiltonians are obtained.Comment: 11 pages, no figures
A secure data outsourcing scheme based on Asmuth – Bloom secret sharing
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users’ queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients’ data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth–Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing
Seasonal biodiversity and ecological studies on the epiphytic microalgae communities in polluted and unpolluted aquatic ecosystem at Assiut, Egypt
A qualitative and quantitative study on epiphytic microalgae was carried out seasonally from November 2015 to August 2016 to follow up their community structures on aquatic macrophytes related to some physico-chemical properties of two polluted and unpolluted water bodies at Assiut, Egypt. A total of 169 species related to 64 genera of epiphytic microalgae were recorded. The most dominant algal group was Bacillariophyceae (43.2%), followed by Chlorophyceae (34.91%), Cyanophyceae (20.71%) and Euglenophyceae (1.18%). The total number of epiphytic algae fluctuated between 11.1 Ă— 104 ind.g-1 plant dry wt. on Phragmites australis in summer at Nazlet Abdellah (polluted site) and 10.02 Ă— 107 ind.g-1 plant dry wt. on Myriophyllum spicatum in winter at El-Wasta (unpolluted site). Some epiphytic microalgae were dominant as Pseudanabaena limnetica, Calothrix braunii, Scenedesmus acutus, and Ulnaria ulna. Others were specific on certain macrophytes as Aphanocapsa thermalis and Ulothrix sp., which grow on Phragmites australis, while Synechocystis minuscula attached itself on Myriophyllum spicatum. Analysis of PERMANOVA showed that the most important factors that induced the variation in epiphytic microalgae were the temporal variation and host plant. Water temperature, pH, nitrate, chloride, phosphate and total dissolved salts were the highest abiotic factors correlated with the variation in composition of epiphytic microalgae
- …