scispace - formally typeset
Search or ask a question
Author

Rugui Yao

Bio: Rugui Yao is an academic researcher from Northwestern Polytechnical University. The author has contributed to research in topics: Relay & MIMO. The author has an hindex of 9, co-authored 82 publications receiving 357 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: An optimization problem to maximize the achievable secrecy rate by jointly optimizing the energy splitting for the source and destination is formulated and an iterative optimization algorithm to obtain the near-optimal energy splitting policy is proposed.
Abstract: In this paper, a destination-assisted-jamming -based secure transmission is devised for an untrusted and energy harvesting relay network. In the proposed scheme, both source and destination split their energies into two parts for energy harvesting at the relay and transmissions of confidential and cooperative jamming signals, respectively. We formulate an optimization problem to maximize the achievable secrecy rate by jointly optimizing the energy splitting for the source and destination. The existence of the solution for the optimization is carefully analyzed. Due to high complexity of the joint optimization, an iterative optimization algorithm to obtain the near-optimal energy splitting policy is proposed. The numerical results validate that the optimized energy splitting policy leads to a higher achievable secrecy rate, and the iterative algorithm has a quick convergence rate.

39 citations

Journal ArticleDOI
TL;DR: A destination-assisted-jamming (DAJ) technique to improve the security performance of a two-way untrusted relay network using a novel beamforming alignment and suboptimal power allocation (Sub-OPA) scheme.
Abstract: In this paper, a joint beamforming alignment and suboptimal power allocation (Sub-OPA) for a two-way untrusted relay network is presented. Considering the link between users is established via only an untrusted relay because of either the shadowing fading or long distance between users, we utilize a destination-assisted-jamming (DAJ) technique to improve the security performance. In each time slot, a user transmits confidential signals and the other emits jamming signals simultaneously to prevent the untrusted relay from intercepting the confidential signals. First, we design a novel beamforming to align the confidential signal to the subspace corresponding to the confidential transmission channel and direct the cooperative jamming signal toward untrusted relay. Then, an iterative algorithm is presented to generate the Sub-OPA of each user for the transmission of confidential and cooperative jamming signal. The correctness and efficiency of the proposed beamforming scheme and the Sub-OPA are validated by numerical simulations and the results are compared via MatLab optimization toolbox. Moreover, the simulations show the iterative algorithm is converged after the fourth iteration at lower signal-to-noise ratios (SNRs) and rapidly converged with allocating more power to the confidential signals at higher SNRs.

33 citations

Patent
Yi He, Ling Wang, Rugui Yao, Zhang Zhaolin, Dong Peng 
12 Sep 2012
TL;DR: In this article, a method for identifying opinion leaders in a social network based on topic link behaviors of users is proposed, which is composed of nodes which have a larger value of B(i).
Abstract: The invention discloses a method for identifying opinion leaders in a social network based on topic link behaviors of users, comprising constructing a social network directed graph, amending edge-weight of the network, for each network node i, calculating the number of shortest paths passing through the node i, calculating the length of the shortest paths, weighting edges of the node, and calculating weighted sum B(i). Opinion leaders based on topic tracking are composed of nodes which have a larger value of B(i). The method of the invention adopts a calculation method of link relations in social network user topics, which reduces scale of network nodes and accordingly decreases system overhead and improves algorithm accuracy and recall rate.

29 citations

Journal ArticleDOI
TL;DR: The cooperative CTP allows us to use more efficient intra-tier precoder (ITP) in SCs to handle intracell interference and improve the throughput of the cognitive system.
Abstract: In this paper, we study cooperative precoder design in two-tier networks, consisting of a macro-cell (MC) and several small-cells (SCs). By exploiting multiuser Vandermonde-subspace frequency division multiplexing (VFDM) transmission, an MC downlink can co-exist with cognitive SCs. In this paper, we first propose a cooperative cross-tier precoder (CTP) among the transmitters in the SCs to increase the transmitted dimension. The cooperative CTP allows us to use more efficient intra-tier precoder (ITP) in SCs to handle intracell interference and improve the throughput of the cognitive system. And then, three ITPs, a block-diagonal zero-forcing (BD-ZF) ITP, a capacity-achieving (CA) ITP, and a generalized MMSE channel inversion (GMI) ITP, are developed. Complexities of all CTPs and ITPs are discussed and compared. The overhead of channel state information (CSI) exchange is analyzed. Numerical results are presented to demonstrate the throughput improvement of the proposed schemes and to discover the impact of the imperfect CSI. From the complexity comparison and the numerical results, the GMI ITP offers a good tradeoff between complexity and throughput.

28 citations

Journal ArticleDOI
TL;DR: In this article, an optimal secure transmission scheme for an EH relay network is proposed, where destination-based jamming technique is applied to protect the confidential information from relay's jamming and eavesdropping.
Abstract: For an energy harvesting relay network, an optimal secure transmission scheme is proposed. In the case of limited harvesting energy and total power, destination-based jamming technique is applied to protect the confidential information from relay's jamming and eavesdropping. Moreover, the penalty function algorithm is utilised to obtain the optimal power allocation factor to maximise secure rate. The impacts of power allocation factor and energy transformation efficiency on the system secure rate are analysed. Simulation results validate the correctness and efficiency of the proposed scheme.

27 citations


Cited by
More filters
01 Jan 2016
TL;DR: The table of integrals series and products is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
Abstract: Thank you very much for downloading table of integrals series and products. Maybe you have knowledge that, people have look hundreds times for their chosen books like this table of integrals series and products, but end up in harmful downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they cope with some harmful virus inside their laptop. table of integrals series and products is available in our book collection an online access to it is set as public so you can get it instantly. Our book servers saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the table of integrals series and products is universally compatible with any devices to read.

4,085 citations

Journal ArticleDOI
TL;DR: A comprehensive survey on UAV communication towards 5G/B5G wireless networks is presented in this article, where UAVs are expected to be an important component of the upcoming wireless networks that can potentially facilitate wireless broadcast and support high rate transmissions.
Abstract: Providing ubiquitous connectivity to diverse device types is the key challenge for 5G and beyond 5G (B5G). Unmanned aerial vehicles (UAVs) are expected to be an important component of the upcoming wireless networks that can potentially facilitate wireless broadcast and support high rate transmissions. Compared to the communications with fixed infrastructure, UAV has salient attributes, such as flexible deployment, strong line-of-sight (LoS) connection links, and additional design degrees of freedom with the controlled mobility. In this paper, a comprehensive survey on UAV communication towards 5G/B5G wireless networks is presented. We first briefly introduce essential background and the space-air-ground integrated networks, as well as discuss related research challenges faced by the emerging integrated network architecture. We then provide an exhaustive review of various 5G techniques based on UAV platforms, which we categorize by different domains including physical layer, network layer, and joint communication, computing and caching. In addition, a great number of open research problems are outlined and identified as possible future research directions.

566 citations

Journal ArticleDOI
TL;DR: In this paper, a comprehensive overview of the most promising modulation and multiple access (MA) schemes for 5G networks is presented, including modulation techniques in orthogonal MA (OMA) and various types of non-OMA (NOMA).
Abstract: Fifth generation (5G) wireless networks face various challenges in order to support large-scale heterogeneous traffic and users, therefore new modulation and multiple access (MA) schemes are being developed to meet the changing demands. As this research space is ever increasing, it becomes more important to analyze the various approaches, therefore, in this paper we present a comprehensive overview of the most promising modulation and MA schemes for 5G networks. Unlike other surreys of 5G networks, this paper focuses on multiplexing techniques, including modulation techniques in orthogonal MA (OMA) and various types of non-OMA (NOMA) techniques. Specifically, we first introduce different types of modulation schemes, potential for OMA, and compare their performance in terms of spectral efficiency, out-of-band leakage, and bit-error rate. We then pay close attention to various types of NOMA candidates, including power-domain NOMA, code-domain NOMA, and NOMA multiplexing in multiple domains. From this exploration, we can identify the opportunities and challenges that will have the most significant impacts on modulation and MA designs for 5G networks.

371 citations

Journal ArticleDOI
TL;DR: A review for application of robotics in onshore oil and gas industry and semi-autonomous robots, where actions are performed by robots but cognitive decisions are still taken by skilled operator are presented.

269 citations

Journal ArticleDOI
TL;DR: The characteristics of a single D-shape PCF-SPR sensor with the same structural parameters are compared with those of the dual PCFs sensor and the latter has distinct advantages concerning the spectral sensitivity, resolution, amplitude sensitivity, and figure of merits (FOM).
Abstract: Symmetrical dual D-shape photonic crystal fibers (PCFs) for surface plasmon resonance (SPR) sensing are designed and analyzed by the finite element method (FEM). The performance of the sensor is remarkably enhanced by the directional power coupling between the two fibers. We study the influence of the structural parameters on the performance of the sensor as well as the relationship between the resonance wavelengths and analyze refractive indexes between 1.36 and 1.41. An average spectral sensitivity of 14660 nm/RIU can be achieved in this sensing range and the corresponding refractive index resolution is 6.82 × 10-6 RIU. The characteristics of a single D-shape PCF-SPR sensor with the same structural parameters are compared with those of the dual PCFs sensor and the latter has distinct advantages concerning the spectral sensitivity, resolution, amplitude sensitivity, and figure of merits (FOM).

192 citations