2,507 research outputs found

    Model of neutrino effective masses

    Get PDF
    It is shown that an effective (nonrenormalizable) coupling of lepton multiplets to scalar triplets in the 331 model with sterile/exotic neutrinos, can be a good way for generating neutrino masses of different types. The method is simple and avoids radiative/loop calculations which, sometimes, are long and complicated. Basing on some astrophysical arguments it is also stated that the scale of SU(3)L symmetry breaking is at TeV scale, in agreement with earlier investigations. Or equivalently, starting from this symmetry breaking scale we could have sterile/exotic neutrinos with mass of a few keV's which could be used to explain several astrophysical and cosmological puzzles, such as the dark matter, the fast motion of the observed pulsars, the re-ionization of the Universe, etc

    Secrecy Capacity of the Primary System in a Cognitive Radio Network

    Get PDF
    With fast growth of wireless services, secrecy has become an increasingly important issue for wireless networks. In this paper, we investigate the secrecy capacity of the primary system in a cognitive radio system based on artificial noise, which has been proposed for dealing with the eavesdropper. We first consider a special case of one eavesdropper and two regimes of the eavesdropping channel condition. Specifically, we analyze the impact of interference generated by a secondary system toward the primary system in a cognitive radio system. The channel state information (CSI) of the primary channel is assumed to be perfectly known at both the primary transmitter and receiver, whereas that of the eavesdropper is partially known. Under these assumptions, we derive analytical expressions for the ergodic secrecy capacity in the cases of strong eavesdropping channel and weak eavesdropping channel and analyze the impact of the secondary system on the primary ergodic secrecy capacity. Moreover, we extend the analysis to the general case of arbitrary eavesdropping channel condition and arbitrary number of eavesdroppers. Some numerical results will be also presented to verify the analysis

    Weak self-sustained system under the actions of less weak excitations

    Get PDF
    It has been known that, in several cases, to study quasi-linear oscillating system, the degrees of smallness of various factors must be distinguished in detail [2-7]. To affirm again this interesting remark, we shall examine a weak (of order ε2) self-sustained system subjected to less weak (of order ε) excitations in resonance cases. It will be seen that the system considered is enhanced

    On a variant of the asymptotic procedure (II: Weakly nonlinear non-autonomous systems)

    Get PDF
    A variant of the asymptotic method is proposed to construct steady solution of weakly nonlinear non-autonomous oscillating systems. The amplitude and the diphase angle of order ε0\varepsilon^0 are used as variables, the uniqueness of the asymptotic expansions is assured by stationarity conditions

    On the Design of Secure Full-Duplex Multiuser Systems under User Grouping Method

    Full text link
    Consider a full-duplex (FD) multiuser system where an FD base station (BS) is designed to simultaneously serve both downlink users and uplink users in the presence of half-duplex eavesdroppers (Eves). Our problem is to maximize the minimum secrecy rate (SR) among all legitimate users by proposing a novel user grouping method, where information signals at the FD-BS are accompanied with artificial noise to degrade the Eves' channel. The SR problem has a highly nonconcave and nonsmooth objective, subject to nonconvex constraints due to coupling between the optimization variables. Nevertheless, we develop a path-following low-complexity algorithm, which invokes only a simple convex program of moderate dimensions at each iteration. We show that our path-following algorithm guarantees convergence at least to a local optima. The numerical results demonstrate the merit of our proposed approach compared to existing well-known ones, i.e., conventional FD and nonorthogonal multiple access.Comment: 6 pages, 3 figure

    Enabling non-linear energy harvesting in power domain based multiple access in relaying networks: Outage and ergodic capacity performance analysis

    Get PDF
    The Power Domain-based Multiple Access (PDMA) scheme is considered as one kind of Non-Orthogonal Multiple Access (NOMA) in green communications and can support energy-limited devices by employing wireless power transfer. Such a technique is known as a lifetime-expanding solution for operations in future access policy, especially in the deployment of power-constrained relays for a three-node dual-hop system. In particular, PDMA and energy harvesting are considered as two communication concepts, which are jointly investigated in this paper. However, the dual-hop relaying network system is a popular model assuming an ideal linear energy harvesting circuit, as in recent works, while the practical system situation motivates us to concentrate on another protocol, namely non-linear energy harvesting. As important results, a closed-form formula of outage probability and ergodic capacity is studied under a practical non-linear energy harvesting model. To explore the optimal system performance in terms of outage probability and ergodic capacity, several main parameters including the energy harvesting coefficients, position allocation of each node, power allocation factors, and transmit signal-to-noise ratio (SNR) are jointly considered. To provide insights into the performance, the approximate expressions for the ergodic capacity are given. By matching analytical and Monte Carlo simulations, the correctness of this framework can be examined. With the observation of the simulation results, the figures also show that the performance of energy harvesting-aware PDMA systems under the proposed model can satisfy the requirements in real PDMA applications.Web of Science87art. no. 81
    • …
    corecore