318 research outputs found

    Maximum likelihood based estimation of frequency and phase offset in DCT OFDM systems under non-circular transmissions: algorithms, analysis and comparisons

    Get PDF
    Recently, the advantages of the discrete cosine transform (DCT) based orthogonal frequency-division multiplexing (OFDM) have come to the light. We thus consider DCT- OFDM with non-circular transmission (our results cover circular transmission as well) and present two blind joint maximum- likelihood frequency offset and phase offset estimators. Both our theoretical analysis and numerical comparisons reveal new advantages of DCT-OFDM over the traditional discrete Fourier transform (DFT) based OFDM. These advantages, as well as those already uncovered in the early works on DCT-OFDM, support the belief that DCT-OFDM is a promising multi-carrier modulation scheme

    Deep Reinforcement Learning for Real-Time Optimization in NB-IoT Networks

    Get PDF
    NarrowBand-Internet of Things (NB-IoT) is an emerging cellular-based technology that offers a range of flexible configurations for massive IoT radio access from groups of devices with heterogeneous requirements. A configuration specifies the amount of radio resource allocated to each group of devices for random access and for data transmission. Assuming no knowledge of the traffic statistics, there exists an important challenge in "how to determine the configuration that maximizes the long-term average number of served IoT devices at each Transmission Time Interval (TTI) in an online fashion". Given the complexity of searching for optimal configuration, we first develop real-time configuration selection based on the tabular Q-learning (tabular-Q), the Linear Approximation based Q-learning (LA-Q), and the Deep Neural Network based Q-learning (DQN) in the single-parameter single-group scenario. Our results show that the proposed reinforcement learning based approaches considerably outperform the conventional heuristic approaches based on load estimation (LE-URC) in terms of the number of served IoT devices. This result also indicates that LA-Q and DQN can be good alternatives for tabular-Q to achieve almost the same performance with much less training time. We further advance LA-Q and DQN via Actions Aggregation (AA-LA-Q and AA-DQN) and via Cooperative Multi-Agent learning (CMA-DQN) for the multi-parameter multi-group scenario, thereby solve the problem that Q-learning agents do not converge in high-dimensional configurations. In this scenario, the superiority of the proposed Q-learning approaches over the conventional LE-URC approach significantly improves with the increase of configuration dimensions, and the CMA-DQN approach outperforms the other approaches in both throughput and training efficiency

    Cooperative spectrum sensing with secondary user selection for cognitive radio networks over Nakagami-m fading channels

    Get PDF
    This paper investigates cooperative spectrum sensing (CSS) in cognitive wireless radio networks (CWRNs). A practical system is considered where all channels experience Nakagami-mm fading and suffer from background noise. The realisation of the CSS can follow two approaches where the final spectrum decision is based on either only the global decision at fusion centre (FC) or both decisions from the FC and secondary user (SU). By deriving closed-form expressions and bounds of missed detection probability (MDP) and false alarm probability (FAP), we are able to not only demonstrate the impacts of the mm-parameter on the sensing performance but also evaluate and compare the effectiveness of the two CSS schemes with respect to various fading parameters and the number of SUs. It is interestingly noticed that a smaller number of SUs could be selected to achieve the lower bound of the MDP rather using all the available SUs while still maintaining a low FAP. As a second contribution, we propose a secondary user selection algorithm for the CSS to find the optimised number of SUs for lower complexity and reduced power consumption. Finally, numerical results are provided to demonstrate the findings

    Enhancing physical layer security of cognitive radio transceiver via chaotic OFDM

    Get PDF
    Due to the enormous potential of improving the spectral utilization by using Cognitive Radio (CR), designing adaptive access system and addressing its physical layer security are the most important and challenging issues in CR networks. Since CR transceivers need to transmit over multiple non-contiguous frequency holes, multi-carrier based system is one of the best candidates for CR's physical layer design. In this paper, we propose a combined chaotic scrambling (CS) and chaotic shift keying (CSK) scheme in Orthogonal Frequency Division Multiplexing (OFDM) based CR to enhance its physical layer security. By employing chaos based third order Chebyshev map which allows optimum bit error rate (BER) performance of CSK modulation, the proposed combined scheme outperforms the traditional OFDM system in overlay scenario with Rayleigh fading channel. Importantly, with two layers of encryption based on chaotic scrambling and CSK modulation, large key size can be generated to resist any brute-force attack, leading to a significantly improved level of security

    A family of spread-sequences for CDMA system in a multipath fading channel

    Get PDF
    A new class of orthogonal code-division multiple access (CDMA) system is developed. The key characteristic of the system is that the data symbols are spreaded by a spread-sequence that is longer than the period of the symbol and hence overlapped with the neighboring symbols. Using this approach, temporal diversity is incorporated with other diversities. Due to the temporal diversity, the proposed CDMA system performs well in a fading environment. In this paper, a method for designing such a spread-sequence using filter bank theory is presented. The length of the spread-sequence could be varied according to the requirement. Simulation results show that the proposed spread-sequence based system yields lower BER than the conventional Gold codes based DS/CDMA system.published_or_final_versio

    Performance of Generalized Lapped Transform (GLT) Based CDMA System in a Multi-Path Fading Channel

    Get PDF
    We investigate the performance of a new class of spreading codes in a direct sequence spread spectrum (DSSS/CDMA) system. The spreading and despreading codes are generated from a biorthogonal filter bank whose outputs are of continuous values. The performance of the proposed codes is compared with the Gold codes in a Rayleigh fading multipath channel. Simulation results show that the proposed codes yield lower BER performance than the Gold codes when the number of users is reasonably large.published_or_final_versio

    Enhancing secrecy rate in cognitive radio networks via stackelberg game

    Get PDF
    In this paper, a game theory based cooperation scheme is investigated to enhance the physical layer security in both primary and secondary transmissions of a cognitive radio network (CRN). In CRNs, the primary network may decide to lease its own spectrum for a fraction of time to the secondary nodes in exchange of appropriate remuneration. We consider the secondary transmitter node as a trusted relay for primary transmission to forward primary messages in a decode-and-forward (DF) fashion and, at the same time, allows part of its available power to be used to transmit artificial noise (i.e., jamming signal) to enhance primary and secondary secrecy rates. In order to allocate power between message and jamming signals, we formulate and solve the optimization problem for maximizing the secrecy rates under malicious attempts from EDs. We then analyse the cooperation between the primary and secondary nodes from a game-theoretic perspective where we model their interaction as a Stackelberg game with a theoretically proved and computed Stackelberg equilibrium. We show that the spectrum leasing based on trading secondary access for cooperation by means of relay and jammer is a promising framework for enhancing security in CRNs

    Generalized lapped transform (GLT) based high-speed for transmissionfor wireless mobile communications

    Get PDF
    In this paper, we describe a generalized lapped transform (GLT) based high-speed transmission technique for wireless mobile communications over Rayleigh fading channels. In this technique, the high-rate data bits are serial-to-parallel converted into low-rate data streams which are then modulated by the GLT based signature sequences. Numerical results show that the GLT based system gives better results than the Walsh code, PN concatenated sequence based system (Letaief et al., 1995)published_or_final_versio

    Deep Reinforcement Learning-Based Secure Standalone Intelligent Reflecting Surface Operation

    Get PDF
    In this paper, we investigate secure wireless commu-nication in an intelligent reflecting surface (IRS)-assisted system where the IRS is used to secure the communication of one legitimate receiver in presence of an eavesdropper. We assume that the IRS is standalone, i.e. the passive beamforming of the IRS is carried out completely on its own. Thus, we design an IRS with several passive elements and only two RF chains that can obtain a partial channel state information (CSI) among each node and the IRS. The partial CSI is then mapped into full CSI by using the correlation information between the channels of different IRS elements. We develop a deep reinforcement learning (DRL)-based framework using the deep deterministic policy gradient (DDPG) algorithm to obtain the IRS beamforming vector resulting in maximizing the secrecy rate. Numerical results demonstrate the ability of this technique to secure the wireless communication system
    corecore