Nghi H. Tran
Other affiliations: University of Saskatchewan, University of Texas Health Science Center at San Antonio, McGill University
Bio: Nghi H. Tran is an academic researcher from University of Akron. The author has contributed to research in topics: Rayleigh fading & Fading. The author has an hindex of 22, co-authored 162 publications receiving 2100 citations. Previous affiliations of Nghi H. Tran include University of Saskatchewan & University of Texas Health Science Center at San Antonio.
Papers published on a yearly basis
TL;DR: This paper shows that FD linear relaying systems with a suitable precoder can attain the same diversity function as their half-duplex (HD) counterparts, and shows that HD orthogonal AF using a superposition constellation is asymptotically optimal in terms of maximum coding gain.
Abstract: This paper investigates the error and diversity performances of full-duplex (FD) amplify-and-forward (AF) singlerelay systems under the effect of residual self-interference. The variance of this interference is assumed to be proportional to the λ-th power of the transmitted power (0 ≤ λ ≤ 1). The study considers the cooperative linear relaying protocol with direct source-destination link and the dual-hop scheme without direct link, both under uncoded and coded frameworks. At first, closed-form pairwise error probability expressions are derived for the uncoded systems, which are then used to obtain tight bounds to the bit error rate (BER) of the coded systems. To shed an insight on the diversity behavior, asymptotic expressions at high transmission powers are also presented. Different from previous works that treat the direct link as interference, this paper shows that FD linear relaying systems with a suitable precoder can attain the same diversity function as their half-duplex (HD) counterparts. However, further analysis shows that HD orthogonal AF using a superposition constellation is asymptotically optimal in terms of maximum coding gain. In addition, it is shown that the diversity of FD dual-hop systems is a decreasing function of λ and is equal to zero when λ = 1. Although HD relaying is asymptotically optimal under the considered protocols and interference model, illustrative results show that FD relaying is advantageous at practical BER levels when λ is sufficiently small.
TL;DR: The problem of secure transmission in two-hop amplify-and-forward untrusted relay networks and the ergodic secrecy capacity (ESC) is considered and compact expressions for the ESC in the high signal-to-noise ratio regime are presented.
Abstract: We consider the problem of secure transmission in two-hop amplify-and-forward untrusted relay networks. We analyze the ergodic secrecy capacity (ESC) and present compact expressions for the ESC in the high signal-to-noise ratio regime. We also examine the impact of large scale antenna arrays at either the source or the destination. For large antenna arrays at the source, we confirm that the ESC is solely determined by the channel between the relay and the destination. For very large antenna arrays at the destination, we confirm that the ESC is solely determined by the channel between the source and the relay.
TL;DR: This article presents a comprehensive summary of current state-of-theart PHY security concepts in wireless relay networks, and outlines important future research directions in relaying topologies, full-duplex relaying, and cross-layer design that can ignite new interests and ideas on the topic.
Abstract: Cooperative relaying is an effective method of increasing the range and reliability of wireless networks, and several relaying strategies have been adopted in major wireless standards. Recently, cooperative relaying has also been considered in the context of PHY security, which is a new security paradigm to supplement traditional cryptographic schemes that usually handle security at the upper layers. In wireless PHY security, relay nodes can be used to exploit the physical layer properties of wireless channels in order to support a secured transmission from a source to a destination in the presence of one or more eavesdroppers. While some breakthroughs have been made in this emerging research area, to date, the problem of how to effectively adopt advanced relaying protocols to enhance PHY security is still far from being fully understood. In this article, we present a comprehensive summary of current state-of-theart PHY security concepts in wireless relay networks. A case study is then provided to quantify the benefits of power allocation and relay location for enhanced security. We finally outline important future research directions in relaying topologies, full-duplex relaying, and cross-layer design that can ignite new interests and ideas on the topic.
TL;DR: Comparisons between the half-duplex and FD systems are carried out, where analytical and simulation results reveal that the FD system is superior in high source power regions with either fixed or large power constraints at the relay.
Abstract: This paper investigates the optimal power allocation scheme and corresponding capacity limit of a full-duplex (FD) dual-hop amplify-and-forward relay system under residual self-interference whose variance is proportional to the λ'th power of the transmitted power (0≤λ≤1). At first, the related optimization problems are shown to be quasiconcave under both per-node and sum power constraints. Given the non-linearity of the derivative, bisection is then proposed to obtain the optimal power strategies. The capacity and optimal schemes are then analyzed in different high power regions. Specifically, we apply the dominant balance method to show that full power at the relay is suboptimal when its power constraint approaches a large value. Following a similar approach, we then show that the multiplexing gain of the FD scheme with the optimal allocation is 1/[1+λ]. Comparisons between the half-duplex and FD systems are finally carried out, where analytical and simulation results reveal that the FD system is superior in high source power regions with either fixed or large power constraints at the relay.
TL;DR: It is shown that using the class of the optimal rotation matrices, the performance of BICM-ID systems over a Rayleigh fading channel approaches that of the BIC mappings over an AWGN channel when the dimension of the signal constellation increases.
Abstract: This paper presents a performance analysis of bit-interleaved coded-modulation with iterative decoding (BICM-ID) and complex N-dimensional signal space diversity in fading channels to investigate its performance limitation, the choice of the rotation matrix and the design of a low-complexity receiver. The tight error bound is first analytically derived. Based on the design criterion obtained from the error bound, the optimality of the rotation matrix is then established. It is shown that using the class of the optimal rotation matrices, the performance of BICM-ID systems over a Rayleigh fading channel approaches that of the BICM-ID systems over an AWGN channel when the dimension of the signal constellation increases. Furthermore, by exploiting the sigma mapping for any M-ary QAM constellation, a very simple sub-optimal, but yet effective iterative receiver structure suitable for signal constellations with large dimensions is proposed. Simulation results in various cases and conditions indicate that the proposed receiver can achieve the analytical performance bounds with low complexity
01 Jan 2016
TL;DR: The table of integrals series and products is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
Abstract: Thank you very much for downloading table of integrals series and products. Maybe you have knowledge that, people have look hundreds times for their chosen books like this table of integrals series and products, but end up in harmful downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they cope with some harmful virus inside their laptop. table of integrals series and products is available in our book collection an online access to it is set as public so you can get it instantly. Our book servers saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the table of integrals series and products is universally compatible with any devices to read.
30 Nov 2008
TL;DR: The goal of this paper is to present in a comprehensive fashion the theory underlying bit-interleaved coded modulation, to provide tools for evaluating its performance, and to give guidelines for its design.
Abstract: Zehavi (1992) showed that the performance of coded modulation over a Rayleigh fading channel can be improved by bit-wise interleaving the encoder output and by using an appropriate soft-decision metric as an input to a Viterbi decoder. The goal of this paper is to present in a comprehensive fashion the theory underlying bit-interleaved coded modulation, to provide tools for evaluating its performance, and to give guidelines for its design.
TL;DR: The theoretical foundations of BICM are reviewed under the unified framework of error exponents for mismatched decoding, which allows an accurate analysis without any particular assumptions on the length of the interleaver or independence between the multiple bits in a symbol.
Abstract: The principle of coding in the signal space follows directly from Shannon's analysis of waveform Gaussian channels subject to an input constraint. The early design of communication systems focused separately on modulation, namely signal design and detection, and error correcting codes, which deal with errors introduced at the demodulator of the underlying waveform channel. The correct perspective of signal-space coding, although never out of sight of information theorists, was brought back into the focus of coding theorists and system designers by Imai's and Ungerbock's pioneering works on coded modulation. More recently, powerful families of binary codes with a good tradeoff between performance and decoding complexity have been (re-)discovered. Bit-Interleaved Coded Modulation (BICM) is a pragmatic approach combining the best out of both worlds: it takes advantage of the signal-space coding perspective, whilst allowing for the use of powerful families of binary codes with virtually any modulation format. BICM avoids the need for the complicated and somewhat less flexible design typical of coded modulation. As a matter of fact, most of today's systems that achieve high spectral efficiency such as DSL, Wireless LANs, WiMax and evolutions thereof, as well as systems based on low spectral efficiency orthogonal modulation, feature BICM, making BICM the de-facto general coding technique for waveform channels. The theoretical characterization of BICM is at the basis of efficient coding design techniques and also of improved BICM decoders, e.g., those based on the belief propagation iterative algorithm and approximations thereof. In this text, we review the theoretical foundations of BICM under the unified framework of error exponents for mismatched decoding. This framework allows an accurate analysis without any particular assumptions on the length of the interleaver or independence between the multiple bits in a symbol. We further consider the sensitivity of the BICM capacity with respect to the signal-to-noise ratio (SNR), and obtain a wideband regime (or low-SNR regime) characterization. We review efficient tools for the error probability analysis of BICM that go beyond the standard approach of considering infinite interleaving and take into consideration the dependency of the coded bit observations introduced by the modulation. We also present bounds that improve upon the union bound in the region beyond the cutoff rate, and are essential to characterize the performance of modern randomlike codes used in concatenation with BICM. Finally, we turn our attention to BICM with iterative decoding, we review extrinsic information transfer charts, the area theorem and code design via curve fitting. We conclude with an overview of some applications of BICM beyond the classical coherent Gaussian channel.
01 Jan 2014
TL;DR: In this paper, the authors present a comprehensive state-of-the-art survey on SM-MIMO research, to provide a critical appraisal of its potential advantages, and to promote the discussion of its beneficial application areas and their research challenges.
Abstract: A key challenge of future mobile communication research is to strike an attractive compromise between wireless network's area spectral efficiency and energy efficiency. This necessitates a clean-slate approach to wireless system design, embracing the rich body of existing knowledge, especially on multiple-input-multiple-ouput (MIMO) technologies. This motivates the proposal of an emerging wireless communications concept conceived for single-radio-frequency (RF) large-scale MIMO communications, which is termed as SM. The concept of SM has established itself as a beneficial transmission paradigm, subsuming numerous members of the MIMO system family. The research of SM has reached sufficient maturity to motivate its comparison to state-of-the-art MIMO communications, as well as to inspire its application to other emerging wireless systems such as relay-aided, cooperative, small-cell, optical wireless, and power-efficient communications. Furthermore, it has received sufficient research attention to be implemented in testbeds, and it holds the promise of stimulating further vigorous interdisciplinary research in the years to come. This tutorial paper is intended to offer a comprehensive state-of-the-art survey on SM-MIMO research, to provide a critical appraisal of its potential advantages, and to promote the discussion of its beneficial application areas and their research challenges leading to the analysis of the technological issues associated with the implementation of SM-MIMO. The paper is concluded with the description of the world's first experimental activities in this vibrant research field.