71 research outputs found

    Outage Analysis for SWIPT-Enabled Two-Way Cognitive Cooperative Communications

    Full text link
    In this paper, we study a cooperative cognitive radio network (CCRN) where the secondary user-transmitter (SU-Tx) assists bi-directional communication between a pair of primary users (PUs) following the principle of two-way relaying. In return, it gets access to the spectrum of the PUs to enable its own transmission to SU-receiver (SU-Rx). Further, in order to support sustainable operation of the network, SU-Tx is assumed to harvest energy from the RF signals received from the PUs, using the technique of simultaneous wireless information and power transfer (SWIPT). Assuming a decode-and-forward behaviour and power-splitting based relaying protocol at SU-Tx, closed form expressions for outage probability of PU and SU are obtained. Simulation results validate our analytical results and illustrate spectrum-efficiency and energy-efficiency advantages of the proposed system over one-way relaying.Comment: 15 pages, 5 figures, Submitted to IEEE Transactions on Vehicular Technolog

    Secure Full-Duplex Device-to-Device Communication

    Get PDF
    This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to limited processing capability, D2D users are susceptible to external attacks. Our aim is to design optimal beamforming and power control mechanism to guarantee secure communication while delivering the required quality-of-service (QoS) for the D2D link. In order to improve security, artificial noise (AN) is transmitted by the BS. We design robust beamforming for secure message as well as the AN in the worst-case sense for minimizing total transmit power with imperfect channel state information (CSI) of all links available at the BS. The problem is strictly non-convex with infinitely many constraints. By discovering the hidden convexity of the problem, we derive a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201

    Transfer Learning with Deep Convolutional Neural Network (CNN) for Pneumonia Detection using Chest X-ray

    Get PDF
    Pneumonia is a life-threatening disease, which occurs in the lungs caused by either bacterial or viral infection. It can be life-endangering if not acted upon in the right time and thus an early diagnosis of pneumonia is vital. The aim of this paper is to automatically detect bacterial and viral pneumonia using digital x-ray images. It provides a detailed report on advances made in making accurate detection of pneumonia and then presents the methodology adopted by the authors. Four different pre-trained deep Convolutional Neural Network (CNN)- AlexNet, ResNet18, DenseNet201, and SqueezeNet were used for transfer learning. 5247 Bacterial, viral and normal chest x-rays images underwent preprocessing techniques and the modified images were trained for the transfer learning based classification task. In this work, the authors have reported three schemes of classifications: normal vs pneumonia, bacterial vs viral pneumonia and normal, bacterial and viral pneumonia. The classification accuracy of normal and pneumonia images, bacterial and viral pneumonia images, and normal, bacterial and viral pneumonia were 98%, 95%, and 93.3% respectively. This is the highest accuracy in any scheme than the accuracies reported in the literature. Therefore, the proposed study can be useful in faster-diagnosing pneumonia by the radiologist and can help in the fast airport screening of pneumonia patients.Comment: 13 Figures, 5 tables. arXiv admin note: text overlap with arXiv:2003.1314

    Robust secrecy beamforming with energy-harvesting eavesdroppers

    Get PDF
    This letter considers simultaneous wireless information and power transfer (SWIPT) in multiple-input-single-output downlink systems in which a multiantenna transmitter sends a secret message to a single-antenna information receiver (IR) with multiple single-antenna energy receivers (ERs). We aim to maximize the harvested energy by the ERs while maintaining the signal-to-interference-and-noise ratio (SINR) threshold at the IR and keeping the message secure from possible eavesdropping by the ERs by suppressing their SINRs. Both scenarios of perfect and imperfect channel state information at the transmitter are studied. Using semidefinite relaxation techniques, we show that there always exists a rank-one optimal solution for the IR, i.e., transmit beamforming is optimal for the IR

    Secure Full-Duplex Two-Way Relaying for SWIPT

    Get PDF
    This letter studies bi-directional secure information exchange in a simultaneous wireless information and power transfer (SWIPT) system enabled by a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward (AF) relay. The AF relay injects artificial noise (AN) in order to confuse the eavesdropper. Specifically, we assume a zeroforcing (ZF) solution constraint to eliminate the residual self-interference (RSI). As a consequence, we address the optimal joint design of the ZF matrix and the AN covariance matrix at the relay node as well as the transmit power at the sources. We propose an alternating algorithm utilizing semi-definite programming (SDP) technique and one-dimensional searching to achieve the optimal solution. Simulation results are provided to demonstrate the effectiveness of the proposed algorithm.Comment: Submitted to IEEE Wireless Communications Letter

    UAV-Aided Jamming for Secure Ground Communication with Unknown Eavesdropper Location

    Get PDF
    This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique for enabling physical layer keyless security in scenarios where the exact eavesdropper location is unknown. We assume that the unknown eavesdropper location is within an ellipse characterizing the coverage region of the transmitter. By sequentially optimizing the transmit power, the flight path of the UAV and its jamming power, we aim at maximizing the average secrecy rate with arbitrary eavesdropper location. Simulation results demonstrate that the optimal flight path obtains better secrecy rate performance compared to that using direct UAV flight path encasing the transmitter and the legitimate receiver. Most importantly, even with the unknown eavesdropper location, we obtained a secrecy rate that is comparable to a scenario when the eavesdropper's location is known. However, the average secrecy rate with the unknown eavesdropper location varies depending on the proximity of the eavesdropper to the known location of the transmitter. We also observe that due to the UAV-aided jamming, the average secrecy rate stabilizes at some point even though the average received envelope power of the eavesdropper increases. This essentially demonstrates the effectiveness of the proposed scheme.Comment: Submitted to IEEE Access. Contents may be subject to copyright to IEE
    • …
    corecore