Analysis of the average binary error probabilities and average capacity of wireless communications systems over generalized fading channels have been considered separately in the past. This paper introduces a novel mo...
详细信息
Analysis of the average binary error probabilities and average capacity of wireless communications systems over generalized fading channels have been considered separately in the past. This paper introduces a novel moment generating function-based unified expression for both average binary error probabilities and average capacity of single and multiple link communication with maximal ratio combining. It is a matter to note that the generic unified expression offered in this paper can be easily calculated and that is applicable to a wide variety of fading scenarios, and the mathematical formalism is illustrated with the generalized Gamma fading distribution in order to validate the correctness of our newly derived results.
In this paper, in contrast to the relay selection protocols available in the literature, we propose a partial relay selection protocol utilizing only the shadowing side information of the relays instead of their full ...
详细信息
In this paper, in contrast to the relay selection protocols available in the literature, we propose a partial relay selection protocol utilizing only the shadowing side information of the relays instead of their full channel side information in order to select a relay in a dual-hop relaying system through the available limited feedback channels and power budget. We then presented an exact unified performance expression combining the average bit error probability, ergodic capacity, and moments-generating function of the proposed partial relay selection over generalized fading channels. Referring to the unified performance expression introduced in [1], we explicitly offer a generic unified performance expression that can be easily calculated and that is applicable to a wide variety of fading scenarios. Finally, as an illustration of the mathematical formalism, some numerical and simulation results are generated for an extended generalized-K fading environment, and these numerical and simulation results are shown to be in perfect agreement.
Ergodic capacity and average bit error rate have been widely used to compare the performance of different wireless communication systems. As such recent scientific research and studies revealed strong impact of design...
详细信息
Ergodic capacity and average bit error rate have been widely used to compare the performance of different wireless communication systems. As such recent scientific research and studies revealed strong impact of designing and implementing wireless technologies based on these two performance indicators. However and to the best of our knowledge, the direct links between these two performance indicators have not been explicitly proposed in the literature so far. In this paper, we propose novel relations between the ergodic capacity and the average bit error rate of an overall communication system using binary modulation schemes for signaling with a limited bandwidth and operating over generalized fading channels. More specifically, we show that these two performance measures can be represented in terms of each other, without the need to know the exact end-to-end statistical characterization of the communication channel. We validate the correctness and accuracy of our newly proposed relations and illustrated their usefulness by considering some classical examples.
Unlike stream ciphers, block ciphers are very essential for parallel processing applications. In this paper, the first hardware realization of chaotic-based block cipher is proposed for image encryption applications. ...
详细信息
Unlike stream ciphers, block ciphers are very essential for parallel processing applications. In this paper, the first hardware realization of chaotic-based block cipher is proposed for image encryption applications. The proposed system is tested for known cryptanalysis attacks and for different block sizes. When implemented on Virtex-IV, system performance showed high throughput and utilized small area. Passing successfully in all tests, our system proved to be secure with all block sizes.
In this article a cost-effective and simple system (circuit and algorithm) which allows recognizing different kinds of films by their magneto-field conductive properties is demonstrated. The studied signals are genera...
详细信息
In this article a cost-effective and simple system (circuit and algorithm) which allows recognizing different kinds of films by their magneto-field conductive properties is demonstrated. The studied signals are generated by a proposed circuit. This signal was further analyzed (recognized) in frequency domain creating the Fourier frequency spectrum which is easily used to detect the response of magnetic sample. The novel algorithm in detecting magnetic field is presented here with both simulation and experimental results.
This paper is devoted to the consideration of an algorithm for sequential optimization of paths in directed graphs relative to di_erent cost functions. The considered algorithm is based on an extension of dynamic prog...
详细信息
This paper is devoted to the consideration of an algorithm for sequential optimization of paths in directed graphs relative to di_erent cost functions. The considered algorithm is based on an extension of dynamic programming which allows to represent the initial set of paths and the set of optimal paths after each application of optimization procedure in the form of a directed acyclic graph.
State space modeling of Memristor based Wien `A' oscillator has been demonstrated for the first time considering nonlinear ion drift in Memristor. Time dependant oscillating resistance of Memristor is reported in ...
详细信息
State space modeling of Memristor based Wien `A' oscillator has been demonstrated for the first time considering nonlinear ion drift in Memristor. Time dependant oscillating resistance of Memristor is reported in both state space solution and SPICE simulation which plausibly provide the basis of realizing parametric oscillation by Memristor based Wien oscillator. In addition to this part Memristor is shown to stabilize the final oscillation amplitude by means of its nonlinear dynamic resistance which hints for eliminating diode in the feedback network of conventional Wien oscillator.
This paper will explore the possibilities of implementing a wireless embedded control system for atomically precise manufacturing. The manufacturing process, similar to Scanning Tunneling Microscopy, takes place withi...
详细信息
In this paper, we study the effect of the numerical solution accuracy on the digital implementation of differential chaos generators. Four systems are built on a Xilinx Virtex 4 FPGA using Euler, mid-point, and Runge-...
详细信息
In this paper, we study the effect of the numerical solution accuracy on the digital implementation of differential chaos generators. Four systems are built on a Xilinx Virtex 4 FPGA using Euler, mid-point, and Runge-Kutta fourth order techniques. The twelve implementations are compared based on the FPGA used area, maximum throughput, maximum Lyapunov exponent, and autocorrelation confidence region. Based on circuit performance and the chaotic response of the different implementations, it was found that less complicated numerical solution has better chaotic response and higher throughput.
Cognitive users can share spectrum with primary users under constraints on the interference that results. We present a new pricing strategy for sharing the primary users' available subchannels with cognitive users...
详细信息
ISBN:
(纸本)9781457702495
Cognitive users can share spectrum with primary users under constraints on the interference that results. We present a new pricing strategy for sharing the primary users' available subchannels with cognitive users by optimizing the secondary and primary users' utilities while meeting the primary users' interference constraints. The primary users aim to maximize their revenues by sharing their subchannels with secondary users while ensuring that they achieve a minimum target capacity. On the other hand, the secondary users aim to maximize their capacity under three different constraints: consumed power, a given budget for sharing subchannels, and tolerable interference caused to the primary users. We introduce a sequential procedure based on a distributed algorithm to determine the resource allocation, interference thresholds and prices that satisfy the requirements of both parties in the network. Simulations show that the users face a tradeoff between capacity, power, and price.
暂无评论