scispace - formally typeset
Search or ask a question
Institution

Penn State College of Communications

About: Penn State College of Communications is a based out in . It is known for research contribution in the topics: Relay & Cognitive radio. The organization has 2106 authors who have published 2119 publications receiving 24693 citations.


Papers
More filters
Proceedings ArticleDOI
01 May 2019
TL;DR: The closed-form expression for the secrecy outage probability (SOP) relied on the given scheduling scheme between two representative wiretapping cases is obtained and some meaningful Monte Carlo simulation results are given to show the correctness of the theoretical results.
Abstract: This paper investigates the impact of opportunistic user scheduling scheme on the secure transmission for the integrated satellite terrestrial relay systems (ISTRS), where multiple legitimate terrestrial users and multiple eavesdroppers are concerned in the system In order to obtain the best secrecy performance, the terrestrial user with the optimal signal-to-noise ratio (SNR) is selected by employing opportunistic scheduling scheme to receive the signal In addition, this paper considers two representative eavesdropping cases, ie, Case I which is shown as the colluding case; the eavesdroppers work together and overhear the main channel, and Case II, which is called by non-colluding case: the eavesdropper with the largest SNR will be selected to overhear the legitimate users' channel Furthermore, we obtain the closed-form expression for the secrecy outage probability (SOP) relied on the given scheduling scheme between two representative wiretapping cases In order to obtain further results in high SNR regime, approximate SOP expressions under both cases are also derived At last, some meaningful Monte Carlo (MC) simulation results are given to show the correctness of the theoretical results

7 citations

Proceedings ArticleDOI
01 Dec 2016
TL;DR: The experiential results show that the performance of neighbor discovery using double-face phased array radar in half duplex working mode is about 5 times better than the one using single beam directional antenna in full duplexWorking mode with the same algorithm.
Abstract: As one of the important steps in the process of self-organization of wireless ad hoc networks, neighbor discovery has substantial influence on the network performance. Especially in the modern warfare environment, the time consumption of neighbor discovery is very important for holding the battlefield situation. In this paper, we address the problem of neighbor discovery in ad hoc network with double-face phased array radar. And we take advantage of double-face phased array radar to improve the efficiency of neighbor discovery. Unlike former researches on single beam directional antenna, double beam directional antenna is introduced to our system. However, the direction of the antenna has been limited to two exclusive ranges due to the structure of double-face phased array radar. Obviously, the performance of the system which is in half duplex working mode can be better than the same one using single beam antenna. Thus we compare our system with the one using single beam antenna which is in full duplex mode. The experiential results show that the performance of neighbor discovery using double-face phased array radar in half duplex working mode is about 5 times better than the one using single beam directional antenna in full duplex working mode with the same algorithm.

7 citations

Proceedings ArticleDOI
01 Dec 2015
TL;DR: In this letter, a new max-ratio relay selection scheme in secure buffer-aided cooperative wireless networks is proposed and evaluated, and has the same complexity with the existing max-Ratio relayselection scheme, and can provide significant performance improvement.
Abstract: It has been verified cooperative communication technology is an effective way to achieve physical layer security. Recently, people paid much attention to the cooperative networks with buffering relay, which can get significantly performance advantage. In this letter, a new max-ratio relay selection scheme in secure buffer-aided cooperative wireless networks is proposed and evaluated. The proposed relay selection criteria considers an important constant parameter in instantaneous secrecy capacity. It has the same complexity with the existing max-ratio relay selection scheme, and can provide significant performance improvement. For the asymmetric relay-links, a low complexity power allocation scheme is also proposed. The superiority of the proposed schemes is verified by Monte Carlo simulation results.

7 citations

Journal ArticleDOI
TL;DR: Simulation results show the superiority of the proposed protocol on spectral efficiency compared with conventional massive MIMO SWIPT protocol.

7 citations

Proceedings ArticleDOI
01 Oct 2016
TL;DR: It turns out that when the ratio of active intensity of request to cache is too large or too small, the optimization problem can reduce to a concave problem and the optimal caching deployment is achieved using KKT conditions.
Abstract: Cache-enabled device-to-device (D2D) communication is a promising technique to offload the core traffic and cache deployment is important in achieving the benefits brought by caching. While rare considered optimal caching deployment from the perspective of energy efficiency. In fact, cache deployment will certainly influence the distribution of active transmitters, network interference and power consumption, contributing to corresponding energy efficiency. In this paper, we first derive the accurate expression of content-related energy efficiency of cache-enabled D2D network as a function of cache deployment based on a proposed content-related interference model. And then optimization problem with respect to optimal caching probability to maximize the content-related energy efficiency is formulated. Due to the complicated function structure and highly coupled variables in objective function and constraints, we turn to three special cases to explore the approximately optimal solutions. It turns out that when the ratio of active intensity of request to cache is too large or too small, the optimization problem can reduce to a concave problem and the optimal caching deployment is achieved using KKT conditions. Numerical and simulation results validate the generality of proposed interference model and demonstrate the optimal caching deployment is related to transmit power and content popularity.

7 citations


Authors

Showing all 2106 results

NameH-indexPapersCitations
Xiang-Gen Xia7274420563
Wei Xiong5836410835
S. Shyam Sundar5321010261
Mary Beth Oliver401516854
James E. Katz391528957
Qihui Wu392957001
Timothy L. Sellnow371375557
Homero Gil de Zúñiga371348158
J. David Johnson311003924
Zizi Papacharissi30639078
Guoru Ding301554729
Jinlong Wang291273201
Yueming Cai292063198
Yuhua Xu291704196
Panlong Yang271912374
Network Information
Related Institutions (5)
Southeast University
79.4K papers, 1.1M citations

87% related

Harbin Institute of Technology
109.2K papers, 1.6M citations

86% related

South China University of Technology
69.4K papers, 1.2M citations

86% related

Beijing Institute of Technology
61.8K papers, 798.3K citations

85% related

Beihang University
73.5K papers, 975.6K citations

85% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20223
2021181
2020246
2019240
2018225
2017245