scispace - formally typeset
Search or ask a question
Institution

Penn State College of Communications

About: Penn State College of Communications is a based out in . It is known for research contribution in the topics: Relay & Cognitive radio. The organization has 2106 authors who have published 2119 publications receiving 24693 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A novel physical layer strategy to improve the secrecy performance of multiuser multiple-input single-output networks and new exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput are derived.
Abstract: In this paper, we propose a novel physical layer strategy to improve the secrecy performance of multiuser multiple-input single-output networks. In this strategy, orthogonal space-time block code (OSTBC) is employed at an $A_{\text{A}}$ -antenna base station and artificial noise (AN) is employed at an $A_{\text{J}}$ -antenna cooperative relay to enhance the security level of the network. Moreover, two opportunistic scheduling schemes, namely selection combining (SC) and scan-and-wait combining (SWC), are leveraged to select one legitimate user for data transmission. To evaluate the secrecy performance of the proposed OSTBC-SC-AN and OSTBC-SWC-AN schemes, we derive new exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput. Using numerical results, we show that the OSTBC-SWC-AN scheme outperforms the OSTBC-SC-AN scheme when the switching threshold is carefully chosen, while the OSTBC-SC-AN scheme is independent of the switching threshold. We also show that increasing $A_{\text{A}}$ at a low switching threshold or decreasing ${A_{\rm{A}}}$ at a high switching threshold achieves secrecy enhancement for the OSTBC-SWC-AN scheme, while increasing ${A_{\rm{A}}}$ brings better secrecy performance for the OSTBC-SC-AN scheme.

17 citations

Journal ArticleDOI
TL;DR: A trajectory planning-based Bayesian compressive sensing (TPBCS) algorithm dynamically plans UAVs’ trajectories based on the adaptive simulated annealing (ASA) algorithm, which can bring down the computational cost in UAV path planning compared to the traditional simulated annesaling (SA) algorithm.
Abstract: Locating multiple Radio Frequency (RF) sources by Unmanned Aerial Vehicles (UAVs) using Received Signal Strength (RSS) measurements attracts extensive attention for its intrinsic simplicity in hardware and low cost. However, the signals from multiple RF sources are aggregated at the airborne sensors, making it hard to achieve multi-emitter localization with a limited number of UAVs. In this paper, the Bayesian compressive sensing (BCS) approach is applied to estimating ground targets’ locations exploiting the RSS data collected by the onboard sensors. Meanwhile, to support the BCS approach, which requires sufficient measurements to achieve multi-emitter localization, a sensing architecture comprising a limited number of UAVs is presented. Besides, to optimize the localization result, we put forward a trajectory planning-based Bayesian compressive sensing (TPBCS) algorithm. This algorithm dynamically plans UAVs’ trajectories based on the adaptive simulated annealing (ASA) algorithm, which can bring down the computational cost in UAV path planning compared to the traditional simulated annealing (SA) algorithm. The effectiveness and robustness of the approach are validated by simulations in the end.

17 citations

Journal ArticleDOI
TL;DR: This paper considers the uplink resource allocation problem in cognitive satellite network, where cognitive satellite users exploit the spectrum allocated to terrestrial networks as PUs, and proposes combined resource management architecture to improve computational efficiency and formulate the resource allocationproblem as a cooperative bargaining game based on game theory.
Abstract: With the rapidly increasing spectrum demand by multimedia applications, the limitation of the spectrum resource restricts the improvement of the performance for communication systems. The cognitive spectrum utilization scenario can solve this problem by sharing the licensed spectrum of primary users (PUs) with secondary users under specific constrains. In this paper, we consider the uplink resource allocation problem in cognitive satellite network, where cognitive satellite users exploit the spectrum allocated to terrestrial networks as PUs. In order to control the interference to the PUs caused by cognitive users and achieve a fair allocation with considerable total capacity, we detailedly investigate the joint transmit power and bandwidth allocation problem with reasonable system model we proposed. We propose combined resource management architecture to improve computational efficiency, and formulate the resource allocation problem as a cooperative bargaining game based on game theory. The near optimal joint resource allocation is derived on dual domain of original problem, and a cooperative resource allocating algorithm is proposed based on subgradient method. From simulation results, several important concluding remarks are obtained as follows: 1) The proposed algorithm has a considerable convergence rate, and distributed computation can further improve computational efficiency; 2) The multi-user and multi-beam diversity can improve total capacity, while interference constrains and the limitation of resource limit the performance boundary; and 3) Compared with existing methods, the proposed algorithm is Pareto optimal, which can achieve a better tradeoff between fairness among users and total capacity of the whole network.

17 citations

Journal ArticleDOI
TL;DR: Using an extension of the communication boundary management perspective (Petronio, 1991, 2000) within a case study approach, a breach of patient confidentiality in a managed care environment is examined.
Abstract: Managed care organizations have become one of the dominant forms of health care delivery in the United States. Paradoxically, this system, designed to provide better, less expensive care for patients and increased efficiency for health care providers may be compromising patients’ privacy by making patients’ records available to a wider range of internal and external parties. By allowing many individuals access to patients’ health records, the confidentiality of patients’ private information in the managed care environment is at risk. Using an extension of the communication boundary management perspective (Petronio, 1991, 2000) within a case study approach, a breach of patient confidentiality in a managed care environment is examined. From this analysis, practical recommendations are offered to patients, health care providers, and managed care organizations for managing the paradox of patient confidentiality.

17 citations

Proceedings ArticleDOI
21 May 2016
TL;DR: This paper investigates the impact of hardware impairments on both the outage performance and the instantaneous capacity of dual-hop decode-and-forward (DF) satellite-relay network and finds that the outage floor and the capacity upper bound appear when theHardware impairments exist.
Abstract: The hardware impairments of physical transceivers that create distortions degrade the performance of satellite relay communication. In this paper, we investigate the impact of hardware impairments on both the outage performance and the instantaneous capacity of dual-hop decode-and-forward (DF) satellite-relay network. Specifically, the exact closed-form expression for the outage probability of the system and the analytical expression for the instantaneous capacity of the system are derived over shadowed Rician fading channel, which provide fast means to evaluate the impact of hardware impairments. Moreover, the results reveal that the outage floor and the capacity upper bound appear when the hardware impairments exist. In addition, simulation results are given to show the correctness of the analytical results.

17 citations


Authors

Showing all 2106 results

NameH-indexPapersCitations
Xiang-Gen Xia7274420563
Wei Xiong5836410835
S. Shyam Sundar5321010261
Mary Beth Oliver401516854
James E. Katz391528957
Qihui Wu392957001
Timothy L. Sellnow371375557
Homero Gil de Zúñiga371348158
J. David Johnson311003924
Zizi Papacharissi30639078
Guoru Ding301554729
Jinlong Wang291273201
Yueming Cai292063198
Yuhua Xu291704196
Panlong Yang271912374
Network Information
Related Institutions (5)
Southeast University
79.4K papers, 1.1M citations

87% related

Harbin Institute of Technology
109.2K papers, 1.6M citations

86% related

South China University of Technology
69.4K papers, 1.2M citations

86% related

Beijing Institute of Technology
61.8K papers, 798.3K citations

85% related

Beihang University
73.5K papers, 975.6K citations

85% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20223
2021181
2020246
2019240
2018225
2017245