2,826 research outputs found
Secrecy Capacity of the Primary System in a Cognitive Radio Network
With fast growth of wireless services, secrecy has become an increasingly important issue for wireless networks. In this paper, we investigate the secrecy capacity of the primary system in a cognitive radio system based on artificial noise, which has been proposed for dealing with the eavesdropper. We first consider a special case of one eavesdropper and two regimes of the eavesdropping channel condition. Specifically, we analyze the impact of interference generated by a secondary system toward the primary system in a cognitive radio system. The channel state information (CSI) of the primary channel is assumed to be perfectly known at both the primary transmitter and receiver, whereas that of the eavesdropper is partially known. Under these assumptions, we derive analytical expressions for the ergodic secrecy capacity in the cases of strong eavesdropping channel and weak eavesdropping channel and analyze the impact of the secondary system on the primary ergodic secrecy capacity. Moreover, we extend the analysis to the general case of arbitrary eavesdropping channel condition and arbitrary number of eavesdroppers. Some numerical results will be also presented to verify the analysis
Weak self-sustained system under the actions of less weak excitations
It has been known that, in several cases, to study quasi-linear oscillating system, the degrees of smallness of various factors must be distinguished in detail [2-7]. To affirm again this interesting remark, we shall examine a weak (of order ε2) self-sustained system subjected to less weak (of order ε) excitations in resonance cases. It will be seen that the system considered is enhanced
On a variant of the asymptotic procedure (II: Weakly nonlinear non-autonomous systems)
A variant of the asymptotic method is proposed to construct steady solution of weakly nonlinear non-autonomous oscillating systems. The amplitude and the diphase angle of order are used as variables, the uniqueness of the asymptotic expansions is assured by stationarity conditions
Model of neutrino effective masses
It is shown that an effective (nonrenormalizable) coupling of lepton multiplets to scalar triplets in the 331 model with sterile/exotic neutrinos, can be a good way for generating neutrino masses of different types. The method is simple and avoids radiative/loop calculations which, sometimes, are long and complicated. Basing on some astrophysical arguments it is also stated that the scale of SU(3)L symmetry breaking is at TeV scale, in agreement with earlier investigations. Or equivalently, starting from this symmetry breaking scale we could have sterile/exotic neutrinos with mass of a few keV's which could be used to explain several astrophysical and cosmological puzzles, such as the dark matter, the fast motion of the observed pulsars, the re-ionization of the Universe, etc
On the Design of Secure Full-Duplex Multiuser Systems under User Grouping Method
Consider a full-duplex (FD) multiuser system where an FD base station (BS) is
designed to simultaneously serve both downlink users and uplink users in the
presence of half-duplex eavesdroppers (Eves). Our problem is to maximize the
minimum secrecy rate (SR) among all legitimate users by proposing a novel user
grouping method, where information signals at the FD-BS are accompanied with
artificial noise to degrade the Eves' channel. The SR problem has a highly
nonconcave and nonsmooth objective, subject to nonconvex constraints due to
coupling between the optimization variables. Nevertheless, we develop a
path-following low-complexity algorithm, which invokes only a simple convex
program of moderate dimensions at each iteration. We show that our
path-following algorithm guarantees convergence at least to a local optima. The
numerical results demonstrate the merit of our proposed approach compared to
existing well-known ones, i.e., conventional FD and nonorthogonal multiple
access.Comment: 6 pages, 3 figure
Enabling non-linear energy harvesting in power domain based multiple access in relaying networks: Outage and ergodic capacity performance analysis
The Power Domain-based Multiple Access (PDMA) scheme is considered as one kind of Non-Orthogonal Multiple Access (NOMA) in green communications and can support energy-limited devices by employing wireless power transfer. Such a technique is known as a lifetime-expanding solution for operations in future access policy, especially in the deployment of power-constrained relays for a three-node dual-hop system. In particular, PDMA and energy harvesting are considered as two communication concepts, which are jointly investigated in this paper. However, the dual-hop relaying network system is a popular model assuming an ideal linear energy harvesting circuit, as in recent works, while the practical system situation motivates us to concentrate on another protocol, namely non-linear energy harvesting. As important results, a closed-form formula of outage probability and ergodic capacity is studied under a practical non-linear energy harvesting model. To explore the optimal system performance in terms of outage probability and ergodic capacity, several main parameters including the energy harvesting coefficients, position allocation of each node, power allocation factors, and transmit signal-to-noise ratio (SNR) are jointly considered. To provide insights into the performance, the approximate expressions for the ergodic capacity are given. By matching analytical and Monte Carlo simulations, the correctness of this framework can be examined. With the observation of the simulation results, the figures also show that the performance of energy harvesting-aware PDMA systems under the proposed model can satisfy the requirements in real PDMA applications.Web of Science87art. no. 81
- …