On-off keying (OOK) is one of the modulation schemes for non-coherent impulse radio Ultra-wideband systems. In this paper, the utilization of the kurtosis detector (KD) and fourth power detector (FD) receivers for OOK...On-off keying (OOK) is one of the modulation schemes for non-coherent impulse radio Ultra-wideband systems. In this paper, the utilization of the kurtosis detector (KD) and fourth power detector (FD) receivers for OOK signaling is introduced. We investigate the effect of integration interval and the optimum threshold on the performance of energy detector (ED), KD and FD receivers. The semi analytic expression of BER is obtained by using generalized extreme value distribution function for KD and FD receivers. From performance point of view, the simulation results show that FD receiver outperforms KD and ED receivers. In contrast, the sensitivity to the optimum threshold is greatly reduced in KD receiver compared to ED and FD receivers.展开更多
IEEE 802.16 mesh mode defines routing tree for transmitting data in centralized scheduling but it does not define any explicit proposal for combining uplink and downlink subframes. Deploying combined uplink and downli...IEEE 802.16 mesh mode defines routing tree for transmitting data in centralized scheduling but it does not define any explicit proposal for combining uplink and downlink subframes. Deploying combined uplink and downlink subframes on the centralized scheduling scheme can be more flexible and utilization is improved. However, existing interferences among the transmission of neighboring nodes lead to performance reduction of the network. In this paper, an efficient routing tree algorithm is proposed with combined uplink and downlink slot allocation on the centralized scheduling scheme which can abate interferences in the network. This algorithm allows more subscriber stations to transmit concurrently and so improves spatial reuse in the network. Also, the algorithm uses multi-channel and single channel systems and considers relay model, smoothing switching frequently between transmitting and receiving in successive time slots and fairness in the network. Extensive simulation results demonstrate the effectiveness of the proposed method in terms of scheduling length, link concurrency ratio, network throughput and Channel Utilization Ratio (CUR).展开更多
Improving utilization of the radio spectrum is the main goal of Cognitive Radio Networks (CRN). Recent studies made use of cooperative relay technology in cognitive networks, to increase transmission diversity gain. I...Improving utilization of the radio spectrum is the main goal of Cognitive Radio Networks (CRN). Recent studies made use of cooperative relay technology in cognitive networks, to increase transmission diversity gain. In this paper we consider an OFDM based cooperative cognitive network with a pair of Source-Destination nodes as the primary user (PU), and a pair of Source-Destination nodes—which is assisted with a relay—as the secondary (cognitive) user (SU). Both primary and secondary users share a same spectrum. In a two hop transmission, the source transmits in the first hop, and the half-duplex relay decodes the message, re-encodes and forwards it to the destination in the second hop on a different subcarrier. The cognitive network obeys an underlay paradigm where the SU is allowed to transmit simultaneously with PU, while its power is limited such that the interference caused for PU does not exceed a defined temperature. Under this constraint, a joint subcarrier pairing and power allocation is proposed for SU to maximize its weighted sum rate. The problem is transformed to a convex optimization problem and solved in the dual domain. Then an algorithm to achieve feasible solutions is used based on the optimization results. Through extensive simulations, we compare the spectrum utilization of the proposed approach with the existing ones, and show that interestingly the proposed method improves the weighted sum rate of SU.展开更多
IEEE 802.16e based WiMAX networks promise a desirable available quality of service for mobile users and scheduling algorithms provide the best effective use of network resources in it. In this paper, we propose a nove...IEEE 802.16e based WiMAX networks promise a desirable available quality of service for mobile users and scheduling algorithms provide the best effective use of network resources in it. In this paper, we propose a novel cross-layer scheduling algorithm for OFDMA-based WiMAX networks. Our scheme employs a priority function at the MAC layer and a slot allocation policy at physical layer and by interaction between these two layers specifies the best allocation for each connection. Simulation results show performance of proposed scheme in comparison with two other well-known scheduling algorithms, MAX-SNR scheduling and Proportional Fairness (PF) scheduling. Our proposed cross-layer algorithm outperforms the other algorithms in delay and packet loss rate values for real-time services.展开更多
Wireless relaying has been known to provide the improvements in link reliability, spectral efficiency, and coverage extension. In this paper, we use full duplex relays for Interference Alignment (IA) in K-users Interf...Wireless relaying has been known to provide the improvements in link reliability, spectral efficiency, and coverage extension. In this paper, we use full duplex relays for Interference Alignment (IA) in K-users Interference Channel (IC) and show K Degrees of Freedom (DOF) is achievable. In first hop, relays receive signals from transmitters and forward them to receivers in second hop. Two iteratively algorithms are proposed for computing relays function, precoder, and decoder matrices. First algorithm minimizes leakage interference at receivers that has appropriate performance at high Signal to Noise Ratio (SNR) region. Furthermore, the second algorithm has better performance at low-mediate SNR. The performance of proposed algorithms are compared with other schemes and validated with simulation in terms of achieved sum rate.展开更多
In recent years, underwater acoustic (UWA) communications have received much attention as their applications have begun to shift from military toward commercial. Digital communications through UWA channels differ subs...In recent years, underwater acoustic (UWA) communications have received much attention as their applications have begun to shift from military toward commercial. Digital communications through UWA channels differ substantially from those in other media, such as radio channels, due to severe signal degradations caused by multipath propagation and high temporal and spatial variability of the channel conditions. This paper describes a project designed, based on the results obtained from extensive laboratory and field experiments on sound speed profile in different depths of the Persian Gulf, to investigate and demonstrate an underwater acoustic communication system. Transmitted data are acoustic signals to which for more safety in transmission and low frequency bandwidth, Rivest cipher cryptography algorithm and linear prediction coding are applied, respectively. In transmitter, Quadrature Phase Shift Keying (QPSK) signaling is employed to make efficient use of the available channel bandwidth. In the channel, a comprehensive model for short-range shallow water multipath acoustic channel is presented. The mathematical modeling of the multi-path effects is based on the ray tracing and the image method. Also, the attenuations due to wave scatterings at the surface and their bottom reflections are accounted for. In addition, we consider the loss due to the frequency absorption of different materials and the presence of ambient noises such as the sea state noise, shipping noise, thermal noise and turbulences. In the receiver, to overcome the difficulties of inter symbol interference, adaptive equalization using Decision Feedback Equalizer (DFE) is applied.展开更多
Cognitive radio has been designed for solving the problem of spectrum scarcity by using the spectrum of primary users who don’t use their spectrum on that time. For sensing the spectrum, collaborative spectrum sensin...Cognitive radio has been designed for solving the problem of spectrum scarcity by using the spectrum of primary users who don’t use their spectrum on that time. For sensing the spectrum, collaborative spectrum sensing has been utilized because of robustness. In this paper, a new collaborative spectrum method is proposed based on Least Mean Square (LMS) algorithm. In this scheme, the weights of secondary users were updated in time and finally the sensing results were combined in the fusion center based on their trusted weights. Simulation results show that the proposed scheme can significantly reduce the effects of Spectrum Sensing Data Falsification (SSDF) attackers, when they are smart malicious, and even percentage of malicious users are more than trusted users.展开更多
Channel measurement and modeling is an important issue when designing ultra wideband (UWB) communication systems. A Precise model of the channel response is inevitable for designing an ultra wideband telecommunication...Channel measurement and modeling is an important issue when designing ultra wideband (UWB) communication systems. A Precise model of the channel response is inevitable for designing an ultra wideband telecommunication system. In this article signal propagation in indoor environment and LOS condition is evaluated and the appropriate model of this scenario is presented. Parameters such as the power delay profile, mean excess delay, delay spread, “NP10dB” are analyzed and simulated. Based on analysis results, the proposed model is presented. This model is based on Two-cluster approach but its average power delay profile is described with power function and cluster time of arrival is modeled by the modified exponential distribution. Finally UWB channel parameters of proposed model, Saleh and Valenzuela (S-V) and Two-cluster models are compared. Measurement and simulation results show that considerable improvement for mean excess delay, delay spread and “NP10dB” of proposed model comparing with S-V and Two-cluster model, this means the channel is better described, which mean the channel is described more precisely.展开更多
In this paper, the problem of estimating the direction of arrival of signals of which some may be perfectly correlated is considered. This method can be applied in the situation that the non-Gaussian independent and c...In this paper, the problem of estimating the direction of arrival of signals of which some may be perfectly correlated is considered. This method can be applied in the situation that the non-Gaussian independent and coherent signals coexist with unknown Gaussian noise. In this method at first via mappings, the virtual uniform linear array (ULA) and also the shifted versions of this virtual ULA by assuming that all the DOAs are located in one section are constructed. In order to avoid coloring the noise because of these mappings we use a cumulant matrix instead of a covariance ones. In this method since we construct all the subarrays virtually for detection of coherent signals we do not need the array with regular configuration. The advantages of this method are: increasing the array aperture, having the ability to find the DOAs with fewer sensors and also avoiding the coupling between sensors as much as possible in contrast to conventional spatial smoothing.展开更多
This paper addresses false data injection, which is one of the most significant security challenges in smart grids. Having an accurately estimated state is of great importance for maintaining a stable running conditio...This paper addresses false data injection, which is one of the most significant security challenges in smart grids. Having an accurately estimated state is of great importance for maintaining a stable running condition of smart grids. To preserve the accuracy of the estimated state, bad data detection(BDD) mechanisms are utilized to remove erroneous measurements due to meter failures or outside attacks. In this paper we use a graph-theoretic formulation for false data injection attacks in smart grids and propose defense mechanisms to mitigate this type of attacks. To this end, we discuss characteristics of a typical smart grid graph such as planarity. Then we propose three different approaches to find optimal protected meters set: a fast and efficient heuristic algorithm that works well in practice, an approximation algorithm that provides guarantee for the quality of the protected set, and an exact algorithm that finds the optimal solution. Our extensive simulation results show that our algorithms outperform similar existing solutions in terms of different performance metrics.展开更多
文摘On-off keying (OOK) is one of the modulation schemes for non-coherent impulse radio Ultra-wideband systems. In this paper, the utilization of the kurtosis detector (KD) and fourth power detector (FD) receivers for OOK signaling is introduced. We investigate the effect of integration interval and the optimum threshold on the performance of energy detector (ED), KD and FD receivers. The semi analytic expression of BER is obtained by using generalized extreme value distribution function for KD and FD receivers. From performance point of view, the simulation results show that FD receiver outperforms KD and ED receivers. In contrast, the sensitivity to the optimum threshold is greatly reduced in KD receiver compared to ED and FD receivers.
文摘IEEE 802.16 mesh mode defines routing tree for transmitting data in centralized scheduling but it does not define any explicit proposal for combining uplink and downlink subframes. Deploying combined uplink and downlink subframes on the centralized scheduling scheme can be more flexible and utilization is improved. However, existing interferences among the transmission of neighboring nodes lead to performance reduction of the network. In this paper, an efficient routing tree algorithm is proposed with combined uplink and downlink slot allocation on the centralized scheduling scheme which can abate interferences in the network. This algorithm allows more subscriber stations to transmit concurrently and so improves spatial reuse in the network. Also, the algorithm uses multi-channel and single channel systems and considers relay model, smoothing switching frequently between transmitting and receiving in successive time slots and fairness in the network. Extensive simulation results demonstrate the effectiveness of the proposed method in terms of scheduling length, link concurrency ratio, network throughput and Channel Utilization Ratio (CUR).
文摘Improving utilization of the radio spectrum is the main goal of Cognitive Radio Networks (CRN). Recent studies made use of cooperative relay technology in cognitive networks, to increase transmission diversity gain. In this paper we consider an OFDM based cooperative cognitive network with a pair of Source-Destination nodes as the primary user (PU), and a pair of Source-Destination nodes—which is assisted with a relay—as the secondary (cognitive) user (SU). Both primary and secondary users share a same spectrum. In a two hop transmission, the source transmits in the first hop, and the half-duplex relay decodes the message, re-encodes and forwards it to the destination in the second hop on a different subcarrier. The cognitive network obeys an underlay paradigm where the SU is allowed to transmit simultaneously with PU, while its power is limited such that the interference caused for PU does not exceed a defined temperature. Under this constraint, a joint subcarrier pairing and power allocation is proposed for SU to maximize its weighted sum rate. The problem is transformed to a convex optimization problem and solved in the dual domain. Then an algorithm to achieve feasible solutions is used based on the optimization results. Through extensive simulations, we compare the spectrum utilization of the proposed approach with the existing ones, and show that interestingly the proposed method improves the weighted sum rate of SU.
文摘IEEE 802.16e based WiMAX networks promise a desirable available quality of service for mobile users and scheduling algorithms provide the best effective use of network resources in it. In this paper, we propose a novel cross-layer scheduling algorithm for OFDMA-based WiMAX networks. Our scheme employs a priority function at the MAC layer and a slot allocation policy at physical layer and by interaction between these two layers specifies the best allocation for each connection. Simulation results show performance of proposed scheme in comparison with two other well-known scheduling algorithms, MAX-SNR scheduling and Proportional Fairness (PF) scheduling. Our proposed cross-layer algorithm outperforms the other algorithms in delay and packet loss rate values for real-time services.
文摘Wireless relaying has been known to provide the improvements in link reliability, spectral efficiency, and coverage extension. In this paper, we use full duplex relays for Interference Alignment (IA) in K-users Interference Channel (IC) and show K Degrees of Freedom (DOF) is achievable. In first hop, relays receive signals from transmitters and forward them to receivers in second hop. Two iteratively algorithms are proposed for computing relays function, precoder, and decoder matrices. First algorithm minimizes leakage interference at receivers that has appropriate performance at high Signal to Noise Ratio (SNR) region. Furthermore, the second algorithm has better performance at low-mediate SNR. The performance of proposed algorithms are compared with other schemes and validated with simulation in terms of achieved sum rate.
文摘In recent years, underwater acoustic (UWA) communications have received much attention as their applications have begun to shift from military toward commercial. Digital communications through UWA channels differ substantially from those in other media, such as radio channels, due to severe signal degradations caused by multipath propagation and high temporal and spatial variability of the channel conditions. This paper describes a project designed, based on the results obtained from extensive laboratory and field experiments on sound speed profile in different depths of the Persian Gulf, to investigate and demonstrate an underwater acoustic communication system. Transmitted data are acoustic signals to which for more safety in transmission and low frequency bandwidth, Rivest cipher cryptography algorithm and linear prediction coding are applied, respectively. In transmitter, Quadrature Phase Shift Keying (QPSK) signaling is employed to make efficient use of the available channel bandwidth. In the channel, a comprehensive model for short-range shallow water multipath acoustic channel is presented. The mathematical modeling of the multi-path effects is based on the ray tracing and the image method. Also, the attenuations due to wave scatterings at the surface and their bottom reflections are accounted for. In addition, we consider the loss due to the frequency absorption of different materials and the presence of ambient noises such as the sea state noise, shipping noise, thermal noise and turbulences. In the receiver, to overcome the difficulties of inter symbol interference, adaptive equalization using Decision Feedback Equalizer (DFE) is applied.
文摘Cognitive radio has been designed for solving the problem of spectrum scarcity by using the spectrum of primary users who don’t use their spectrum on that time. For sensing the spectrum, collaborative spectrum sensing has been utilized because of robustness. In this paper, a new collaborative spectrum method is proposed based on Least Mean Square (LMS) algorithm. In this scheme, the weights of secondary users were updated in time and finally the sensing results were combined in the fusion center based on their trusted weights. Simulation results show that the proposed scheme can significantly reduce the effects of Spectrum Sensing Data Falsification (SSDF) attackers, when they are smart malicious, and even percentage of malicious users are more than trusted users.
文摘Channel measurement and modeling is an important issue when designing ultra wideband (UWB) communication systems. A Precise model of the channel response is inevitable for designing an ultra wideband telecommunication system. In this article signal propagation in indoor environment and LOS condition is evaluated and the appropriate model of this scenario is presented. Parameters such as the power delay profile, mean excess delay, delay spread, “NP10dB” are analyzed and simulated. Based on analysis results, the proposed model is presented. This model is based on Two-cluster approach but its average power delay profile is described with power function and cluster time of arrival is modeled by the modified exponential distribution. Finally UWB channel parameters of proposed model, Saleh and Valenzuela (S-V) and Two-cluster models are compared. Measurement and simulation results show that considerable improvement for mean excess delay, delay spread and “NP10dB” of proposed model comparing with S-V and Two-cluster model, this means the channel is better described, which mean the channel is described more precisely.
文摘In this paper, the problem of estimating the direction of arrival of signals of which some may be perfectly correlated is considered. This method can be applied in the situation that the non-Gaussian independent and coherent signals coexist with unknown Gaussian noise. In this method at first via mappings, the virtual uniform linear array (ULA) and also the shifted versions of this virtual ULA by assuming that all the DOAs are located in one section are constructed. In order to avoid coloring the noise because of these mappings we use a cumulant matrix instead of a covariance ones. In this method since we construct all the subarrays virtually for detection of coherent signals we do not need the array with regular configuration. The advantages of this method are: increasing the array aperture, having the ability to find the DOAs with fewer sensors and also avoiding the coupling between sensors as much as possible in contrast to conventional spatial smoothing.
文摘This paper addresses false data injection, which is one of the most significant security challenges in smart grids. Having an accurately estimated state is of great importance for maintaining a stable running condition of smart grids. To preserve the accuracy of the estimated state, bad data detection(BDD) mechanisms are utilized to remove erroneous measurements due to meter failures or outside attacks. In this paper we use a graph-theoretic formulation for false data injection attacks in smart grids and propose defense mechanisms to mitigate this type of attacks. To this end, we discuss characteristics of a typical smart grid graph such as planarity. Then we propose three different approaches to find optimal protected meters set: a fast and efficient heuristic algorithm that works well in practice, an approximation algorithm that provides guarantee for the quality of the protected set, and an exact algorithm that finds the optimal solution. Our extensive simulation results show that our algorithms outperform similar existing solutions in terms of different performance metrics.