Secrecy Performance of Wirelessly Powered Wiretap Channels

Size: px
Start display at page:

Download "Secrecy Performance of Wirelessly Powered Wiretap Channels"

Transcription

1 Secrecy Perforance of Wirelessly Powered Wiretap Channels Jiang, X, Zhong, C, Chen, X, Duong, T Q, Tsiftsis, T, & Zhang, Z 6 Secrecy Perforance of Wirelessly Powered Wiretap Channels IEEE Transactions on Counications DOI: 9/TCOMM65959 Published in: IEEE Transactions on Counications Docuent Version: Peer reviewed version Queen's University Belfast - Research Portal: Link to publication record in Queen's University Belfast Research Portal Publisher rights 6 IEEE Personal use of this aterial is peritted Perission fro IEEE ust be obtained for all other uses, in any current or future edia, including reprinting/republishing this aterial for advertising or prootional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted coponent of this work in other works General rights Copyright for the publications ade accessible via the Queen's University Belfast Research Portal is retained by the authors and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requireents associated with these rights Take down policy The Research Portal is Queen's institutional repository that provides access to Queen's research output Every effort has been ade to ensure that content in the Research Portal does not infringe any person's rights, or applicable UK laws If you discover content in the Research Portal that you believe breaches copyright or violates any law, please contact openaccess@qubacuk Download date:3 Jul 8

2 Secrecy Perforance of Wirelessly Powered Wiretap Channels Xin Jiang, Student Meber, IEEE, Caijun Zhong, Senior Meber, IEEE, Xiaoing Chen, Senior Meber, IEEE, Trung Q Duong, Senior Meber, IEEE, Theodoros Tsiftsis, Senior Meber, IEEE, and Zhaoyang Zhang, Meber, IEEE Abstract This paper considers a wirelessly powered wiretap channel, where an energy constrained ulti-antenna inforation source, powered by a dedicated power beacon, counicates with a legitiate user in the presence of a passive eavesdropper Based on a siple tie-switching protocol where power transfer and inforation transission are separated in tie, we investigate two popular ulti-antenna transission schees at the inforation source, naely axiu ratio transission MRT and transit antenna selection TAS Closed-for expressions are derived for the achievable secrecy outage probability and average secrecy rate for both schees In addition, siple approxiations are obtained at the high signal-to-noise ratio SNR regie Our results deonstrate that by exploiting the full knowledge of channel state inforation CSI, we can achieve a better secrecy perforance, eg, with full CSI of the ain channel, the syste can achieve substantial secrecy diversity gain On the other hand, without the CSI of the ain channel, no diversity gain can be attained Moreover, we show that the additional level of randoness induced by wireless power transfer does not affect the secrecy perforance in the high SNR regie Finally, our theoretical clais are validated by the nuerical results Index Ters Physical layer security, wireless power transfer, secrecy outage probability, average secrecy rate I INTRODUCTION Recently, the rapidly increasing deands for high data rate wireless services have put a treendous pressure on the energy consuption of battery-powered obile devices Hence, how to prolong the lifetie of these energy-constrained Manuscript received February 4, 6, revised April 4, 6, and June 4, 6, accepted July, 6 This work was supported by the National Key Basic Research Progra of China No CB364, the National High-Tech R&D Progra of China under grant 4AAA7 and 4AAA75, the Zhejiang Provincial Natural Science Foundation of China LR5F, and the Fundaental Research Funds for Central Universities 6QNA54 The work of X Chen was supported by the National Natural Science Foundation of China No 63 The work of T Q Duong was supported by the UK Royal Acadey of Engineering Research Fellowship under Grant RF45\4\ The editor coordinating the review of this paper and approving it for publication was Prof Z Ding X Jiang, C Zhong and Z Zhang are with the Institute of Inforation and Counication Engineering, Zhejiang University, China eail: caijunzhong@zjueducn X Chen is with the College of Electronic and Inforation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, Chinaeail: chenxiaoing@nuaaeducn T Q Duong is with ECIT, Queen s University Belfast, Belfast, UKeail: trungqduong@qubacuk T A Tsiftsis is with the School of Engineering, Nazarbayev University, Astana, Kazakhstan and with TEI of Central Greece, Laia 35, Greece eail: Theodorostsiftsis@nuedukz This paper was presented in part at the European Signal Processing Conference, Budapest, Hungary, August 6 obile devices has becoe a critical proble to be addressed Responding to this, energy harvesting techniques, which scavenge energy fro abient environent such as wind and solar have been proposed as a proising solution Nevertheless, harvesting energy fro nature resources depends heavily on the locations and weather conditions, which fails to generate stable energy output, hence ay not be suitable to power wireless devices with strict quality of service requireents As a result, a new energy harvesting paradig, generally referred to as wireless power transfer WPT, has gained considerable attentions By exploiting the radio frequency RF signals as a eans for energy transportation, WPT enables reliable and stable energy supplies to obile devices Since RF signals are widely used as a ediu for inforation transission, incorporating the feature of WPT into wireless counications networks has eerged as a hot topic, generally referred to as siultaneously wireless inforation and power transfer SWIPT systes, and significant research effects have been devoted to understand the fundaental perforance liitation as well as design efficient SWIPT systes, see for instances [] [9] and references therein However, SWIPT systes are also vulnerable to potential security issues This is because RF signals are shared by ultiple nodes, which ight be potential eavesdroppers Recent research results show that copared to conventional cryptographic approaches, physical layer security is a better choice in energy and coputation constrained systes, such as SWIPT systes [] The basic concept behind physical layer security is to exploit the physical layer characteristics of wireless channels to provide perfect secrecy The work was pioneered by Wyner [], which confired that perfect secrecy can be achieved when the quality of the wiretap channel is a degraded version of the ain channel Recently, ensuing security in SWIPT systes have gained increasing attentions In [], [3], the authors presented the optial beaforing design and power allocation schee for ultiple-input single-output MISO systes in the presence of passive eavesdroppers, later in [4], the issue of uncertain eavesdroppers was tackled, where joint optiization of inforation and energy beaforing and power allocation were studied Latest works have considered the security issue in ore sophisticated SWIPT systes, such as relay [5], ulticast [6], cognitive radio [7] and OFDMA systes [8] A coon of these works is that they consider hybrid network architecture, where the inforation source also acts as the energy source However, as analyzed in [9], the

3 harvested energy fro hybrid networks is general infeasible to power larger devices such as sartphones, tablets and laptops Responding to this, a novel network architecture was proposed in [], where a dedicated station called power beacon PB is incorporated into the wireless network to power obile devices Very recently, the secrecy perforance of device-todevice DD counications in energy harvesting cognitive cellular networks has been investigated in [], where the DD transitter first harvests energy fro PBs, then perfors secure transission to the desired DD receiver Thus far, secure counications in SWIPT systes with dedicated PB reain largely an uncharted area Motivated by this, we consider a point-to-point four-node wirelessly powered wiretap channel consisting of a dedicated PB, an energy constrained inforation source and a legitiate user in the presence of a passive eavesdropper It is assued that the source has no transit power of its own, hence entirely relies on the external energy charging via wireless power transfer fro the PB For such systes, we present a coprehensive analysis on the achievable secrecy perforance It is worth pointing out that, unlike in the conventional counications systes, where the transit power is constant, the use of WPT effectively akes the available source transit power a rando variable In addition, since the transit power affects both the signals observed at the legitiate user and eavesdropper, the effective signal-to-noise ratios SNRs of the ain and wiretap channels becoe correlated, aking the secrecy perforance analysis uch ore challenging The ain contributions of this work can be suarized as follows: For enhancing wireless security, we propose siple diversity transission schees at the inforation source, naely, axiu ratio transission MRT and transit antenna selection TAS In particular, for the TAS schee, depending on the required channel state inforation CSI, three different selection criteria are devised For all schees, closed-for expressions for secrecy outage probability are derived, which enable efficient evaluation of the achievable secrecy perforance Furtherore, siple and inforative high SNR approxiations are presented The analytical results suggest that the achievable secrecy perforance depends heavily on the available CSI at the source With the CSI of the ain channel, the syste attains full secrecy diversity gain, while only unit secrecy diversity order can be achieved with only the CSI of the wiretap channel In addition, the best perforance is achieved when both the CSI of ain channel and wiretap channel are available For all schees, closed-for expressions for average secrecy rate and high SNR approxiations are also derived Our results indicate that, all the schees attain the sae high SNR slope of one and distinct high SNR power offset Moreover, increasing the nuber of transit antennas iproves the secrecy rate However, the gain gradually diinishes when the nuber of transit antennas is oderately large Based on the siple high SNR expressions, the optial tie switching ratio θ is studied It was shown that there exists a unique θ axiizing the secrecy throughput For the special single-antenna source case, closed-for expression for the optial θ is obtained We show that, the randoness of source transit power induced by WPT does not affect the secrecy diversity order and the high SNR slope The reainder of the paper is organized as follows Section II introduces the syste odel and proposes several transission schees Section III provides an analytical study on the achievable secrecy outage probability of the proposed schees, while Section IV investigates the average secrecy rate of the syste Nuerical results and discussions are presented in Section V Finally, Section VI concludes the paper and suarizes the key findings Notation: We use bold lower case letters to denote vectors and lower case letters to denote scalars; h denotes the Frobenius nor; E{x} stands for the expectation of the rando variable x and [x] + denotes ax,x; T denotes the transpose operator and denotes the conjugate operator I k is the identity atrix of size k Γx is the gaa function [, Eq 83], Γα, x is the upper incoplete gaa function [, Eq 835] and γα,x is the lower incoplete gaa function [, Eq 835] ψx denotes the Euler psi function [, Eq 836] and K v x is the v- th order odified Bessel function of the second kind [, Eq 847] S a,b x denotes the Loel function [, Eq 857] and G p,q,n x denotes the Meijer G-function [, Eq 93] II SYSTEM MODEL We consider a four-node wirelessly powered wiretap channel consisting of one PB, one inforation source Alice and one legitiate user Bob in the presence of one eavesdropper Eve as shown in Fig We assue that the source is equipped with N antennas, while the other three nodes are equipped with a single antenna Quasi-static fading is assued, such that the channel coefficients reain unchanged during each transission block but vary independently between different blocks We adopt the tie-sharing protocol proposed in [] Hence, a coplete transission slot with tie duration oft is divided into two orthogonal sub-slots, ie, the first one for power transfer with tie duration of θt with θ < θ < being the tie switching ratio, and the second one for inforation transission with tie duration of θt During the first phase, the PB sends an energy signal to Alice, and the received energy signal at Alice y s can be expressed as y s = P S h P x s +n s, where P S denotes the transit power of the PB, x s is the energy signal with unit power,n s is ann-diensional additive The considered ulti-antenna source odel is relevant to the scenarios where an energy constrained ulti-antenna sensor node [?] transits confidential inforation to a single-antenna fusion center or an energy constrained ulti-antenna transitter [4] perfors secrecy transission to a singleantenna receiver

4 3 atch bea, as such, the received signal y M at Bob can be written as P Fig : A scheatic diagra of the syste odel consisting of one PB, one inforation source Alice, one legitiate user Bob and one eavesdropper Eve white Gaussian noise AWGN vector with E{n s n s } = N I The N vector h P denotes the power transfer channel fro PB to Alice Due to relatively short distance between the power beacon and the source, it is likely that the line-ofsight propagation exists Hence, the Nakagai- distribution is used to odel the power transfer channel, ie, the aplitude of each eleent of h P follows Nakagai- distribution with shape paraeter and average power λ P Therefore, at the end of the first phase, the total harvested energy within duration θt can be expressed as M W E = ηp S h P θt, where η < η < denotes the energy conversion efficiency Since the source counicates with the legitiate user during the second phase with duration θt, the transit power can be coputed as P = E θt = ηp S h P θ θ 3 To exploit the benefits of ultiple antennas at Alice, different transission schees can be adopted In this work, we consider two popular transission schees, naely MRT and TAS The ipleentation of MRT and TAS requires different types of CSI For MRT, only the CSI of the ain channel is required While for TAS, partial CSI of the ain channel or the wiretap channel is required In practice, the CSI of the ain channel can be estiated at Bob, and then feed back to Alice On the other hand, the CSI of the wiretap channel can be obtained when the eavesdropper is active in the network, a scenario that is particularly applicable in the networks cobining ulticast and unicast transissions where the terinals play dual roles as legitiate receivers for soe signals and eavesdroppers for others [5], [6] A Maxiu Ratio Transission MRT For the MRT schee, Alice ais at axiizing the reception quality of the ain channel by aking use of a channel- In the presence of line-of-sight effect, Rician fading is coonly used in literature However, the analysis with Rician fading is uch ore involved As such, for atheatical tractability, we adopt the Nakagai- fading odel, since the Nakagai- distribution provides very accurate approxiation to the Rician distribution y M = Ph T Mwx t +n M, 4 where x t denotes the inforation sybol with unit energy; N vector h M denotes the ain channel fro Alice to Bob, whose eleents are circularly syetric coplex Gaussian rando variables RVs with zero ean and variance ; n M denotes the AWGN with zero ean and variance N ; w is the MRT vector given by w = h M h M Siilarly, the signal received at Eve y W can be expressed as y W = Ph T W wx t +n W, 5 where the N vector h W denotes the wiretap channel fro Alice to Eve, whose eleents are circularly syetric coplex Gaussian RVs with zero ean and variance, and n W denotes the AWGN with zero ean and variance N As such, the instantaneous SNR at Bob γ M and at Eve γ W are given by and respectively γm MRT = ηp S h P h M θ N θ, 6 W = ηp S h P h T W h M h M θ θ, 7 γ MRT N B Transit Antenna Selection TAS TAS is another low-coplexity transission schee In this work, we consider three different selection criteria as elaborated below Criterion : In this case, the antenna with the axiu gain of ain channel is selected, ie, k = arg ax i=,,n h id, 8 where h id is the i-th eleent of ain channel h M It is worth noting that best antenna selection according to the above criterion iplies a rando antenna selection for the wiretap channel because the ain channel is independent of the wiretap channel Criterion : Instead of axiizing the gain of ain channel, we now intend to iniize the gain of wiretap channel As such, the best antenna is selected according to the following criterion: k = arg in i=,,n h ie, 9 where h ie is the i-th eleent of the wiretap channel h W 3 Criterion 3: Since the secrecy perforance of syste depends on the quality of both the ain channel and wiretap channel, we now propose the third selection criterion which picks the antenna axiizing the ratio of ain channel gain and wiretap channel gain, ie, k = arg ax i=,,n hid h ie

5 4 Hence, the instantaneous SNR at Bob γ M and at Eve γ W can be expressed as and γm TAS = ηp S h P h M,k θ N θ, γw TAS = ηp S h P h W,k θ N θ, whereh M,k denotes the channel coefficient of the link between the k-th antenna of the source and legitiate user, while h W,k denotes the channel coefficient of the link between the k-th antenna of the source and eavesdropper C Secrecy Perforance For wiretap channels, the secrecy rate C S is given by the difference of the ain channel capacity and the wiretap channel capacity [5] { log+γ C S = M log+γw γ M > γ W, γm γ W, 3 where {MRT,TAS} In this work, we consider two different counication scenarios In the first scenario, Alice uses a constant transission rate R S to counicate with Bob According to [], perfect secrecy is achievable when R S < C S, otherwise, secrecy is coproised In this case, secrecy outage probability becoes an appropriate perforance etric In the second scenario, we assue that Alice adapts its transission rate according to C S, as such, ergodic secrecy rate becoes the appropriate perforance easure In the following sections, we present a detailed analysis of the achievable secrecy perforance of both MRT and TAS schees III SECRECY OUTAGE PROBABILITY In this section, we investigate the secrecy outage perforance of the considered syste For both transission schees, new closed-for expressions for the exact and asyptotic secrecy outage probability are presented Based on which, the ipacts of ultiple antennas on the secrecy perforance are characterized in ters of the secrecy outage diversity order and the secrecy outage array gain According to the definition, the secrecy outage probability can be expressed atheatically as A MRT P out R S = PC S < R S 4 We start with the MRT schee, and we have the following key result: Theore : The exact secrecy outage probability of the MRT schee can be expressed in closed-for as out R S = ΓN P MRT k k λ P N+p N k k= p= K N p k k p p! +k k p+ k, 5 k λ P where k = ηps θ N θ and k = RS Proof: See Appendix A Theore presents an exact closed-for expression for the secrecy outage probability, which can be efficiently evaluated However, the expression is too coplicated to yield any insights Motivated by this, we now look into the asyptotic regie, where siple expressions can be obtained 3 For the asyptotic high SNR regie, we assue that with an arbitrary Such a scenario has been widely adopted in the literature, see for instance [7] [3] In practice, this occurs when the quality of the ain channel is uch better than wiretap channel, ie, Bob is relatively close to Alice while Eve is far away fro Alice or the wiretap channel undergoes severe sall-scale and large-scale fading effects In the following, we characterize the two key perforance paraeters governing the secrecy outage probability in the high SNR regie, ie, secrecy diversity order G d and secrecy array gain G a defined by [3] P out R S = G a G d 6 Proposition : In the high SNR regie, ie,, the secrecy outage probability of the MRT schee can be approxiated by N k N PMRTR ΓN k k k S = ΓN k k λ P k= 7 Proof: See Appendix B It is evident fro 7 that the syste achieves a secrecy diversity order of N In addition, we observe the intuitive effect of the position of nodes on the secrecy outage probability For instance, the secrecy outage probability decreases when the PB is close to the source, ie, large λ P It is also easy to see that the high SNR secrecy outage probability PMRT R S is a decreasing function with respect to Ps N, indicating that increasing the transit power of the PB is always beneficial B TAS Criterion We now ove to the TAS Criterion schee, and we obtain the following key result: Theore : The exact secrecy outage probability of TAS Criterion schee can be expressed in closed-for as N Pout TAS k N R S = k+ λm ΓN +k k + k +k k λ P N K N k= k +k k λ P 8 3 Although the energy transfer efficiency of state of the art technique is low, it is still of both theoretical and practical interests in wirelessly powered counications systes due to the following reasons: First, the energy transfer efficiency can be significantly iproved by adopting ultiple antenna technology and the PB assisted WPC architecture Second, the effective SNR could be still reasonably high even if the energy transfer efficiency is low Third, the key insights obtained fro high SNR analysis provide useful guidance for practical syste design

6 5 Proof: See Appendix C While Theore presents an exact closed-for expression for the secrecy outage probability, the expression is too coplicated to gather ore insights As such, we study the asyptotic behavior for the outage perforance Proposition : In the high SNR regie, ie,, the secrecy outage probability of TAS Criterion schee can be approxiated as PTAS R S = N k N N! ΓN k k k 9 ΓN k k λ P k= Proof: When, we have e x N = N +o N x x As such, following the sae steps as that of Proposition yields the desired result It is evident fro 9 that the syste also achieves a secrecy diversity order of N Coparing 7 and 9, we see that PMRC R S = P TAS RS N!, naely, the MRT schee outperfors the TAS Criterion schee by a factor of N! This is not surprising since the MRT schee has access to perfect CSI of h M, while TAS schee only utilizes partial knowledge of h M Recall in the conventional wirelessly powered syste without secrecy constraint, the outage probability decays in a uch slower speed, ie, ρ N lnρ instead of ρ N due to the randoness of the transit power, where N is the nuber of antennas, and ρ is the SNR [3], [33] In the current work, we notice that the randoness of the transit power does not affect the scaling behavior of the secrecy outage probability This is because that in wiretap channels, the secrecy perforance is deterined by the difference between the ain and wiretap channel capacities, and the transit power affects both channels Hence, the effect of transit power randoness is canceled C TAS Criterion We now consider the TAS Criterion schee, and we have the following key result: Theore 3: The exact secrecy outage probability of TAS Criterion schee can be expressed in closed-for as N ΓN N +k λ W N k K N k λ P P TAS out R S = k k λ P Proof: See Appendix D Having obtained the exact outage probability of TAS Criterion schee, we now look into the high SNR regie, and derive a siple analytical approxiation for the outage probability of the syste Proposition 3: In the high SNR regie, ie,, the secrecy outage probability of TAS Criterion schee can be approxiated as P TASR S = N + N k k k k λ P Proof: See Appendix E Different fro the previous two cases which achieve a diversity order of N, TAS Criterion schee only attains unit diversity order This is also intuitive since TAS Criterion schee ais to iniize the received SNR of the eavesdropper and the selected antenna serves as a rando transit antenna for the ain channel As such, no secrecy diversity gain can be realized, and increasing the nuber of antennas N only yields soe secrecy array gain D TAS Criterion 3 We now analyze the secrecy outage probability of the syste with the TAS Criterion 3 schee Theore 4: The secrecy outage probability of TAS Criterion 3 schee can be approxiated by P TAS3 out k k + λm N Proof: See Appendix F Having obtained the outage probability of TAS Criterion 3 schee, we now look into the asyptotic regie Proposition 4: In the high SNR regie, ie,, the secrecy outage probability of TAS Criterion 3 schee can be approxiated as P TAS3 = k N 3 Proof: The proof is straightforward, hence oitted As expected, the syste achieves a secrecy diversity order of N Recall the high SNR outage probability of the MRT schee, and noticing that N + N k= ΓN k ΓN k= ΓN k ΓN k k k λ P k = k k k λ P k >, we observe that the TAS Criterion 3 schee outperfors the MRT schee This is reasonable since the TAS Criterion 3 schee considers both the CSI of h M and h W, while only the CSI of the h M is utilized in the MRT schee E Optiization of the Tie Switching Ratio θ Fro the analytical expressions derived in previous subsections, we are ready to study the optiization of tie switching ratio θ Specifically, we adopt the effective secrecy throughput as the perforance easure as in [34] Hence, when the source transits at a constant rater S, the average secrecy throughput can be evaluated by R = P out R S θ Also, due to space liitation and for illustrative purpose, we only focus on the MRT schee, while other cases will be nuerically illustrated in Section V Using the high SNR approxiation given in 7, the effective secrecy throughput of the MRT schee can be expressed

7 6 as τθ = P MRTθR S θt T = P MRT θr S θ 4 Hence, the optial θ is the solution of the following optiization proble: θ = argax τθ θ st < θ < 5 To this end, we have the following key result: Proposition 5: Consider a polynoial N k= a k θ θ k + k =, 6 θ k N where a k = ΓN k k N k ΓN ηp Sk λ P Then, the optial θ is the unique root of the polynoial in, Proof: Substituting 7 into 4, we obtain τθ = N k= a k θ θ k b θ, 7 where b = R S Thus, the derivative of τθ with respect to θ can be expressed as dτθ N k θ = a k b + k b 8 dθ θ θ k= dτθ dθ It is easy to show that is a onotonically decreasing function with respect toθ Whenθ approaches, dτθ dθ + N dτθ and when θ approaches, dθ b b b < Therefore, there exists a unique θ, with dτθ dθ =, where τθ attains its axiu value In general, due to the coplexity of the involved expression, deriving a closed-for solution for θ is very challenging However, for sall N, closed-for expressions for θ can be obtained Reark : When N =, the optial θ is given by θ = a +a a 9 Reark : When N =, the optial θ is given by θ = 3 q q p q q p 3, where p = 3a a a +a a and q = a a +a a F Coparison of the Proposed Protocols We now present a ore detailed perforance coparison for the proposed schees at the high SNR regie as suarized in Table I on the top of the next page In general, the secrecy perforance depends heavily on the available CSI at the source The ore CSI available, the better the secrecy perforance However, in ters of high SNR protocols investigated shown in Table I We list the CSI that is required for each protocol and investigate the secrecy diversity order and the outage perforance according to the asyptotic secrecy outage probability IV AVERAGE SECRECY RATE In this section, we focus on the average secrecy rate perforance of the syste For both transission schees, new closed-for expressions for the exact and asyptotic average secrecy rate are presented Based on which, the ipacts of ultiple antennas on the secrecy perforance are characterized in ters of the high SNR slope and the high SNR power offset Starting fro the definition, the average secrecy rate can be expressed as C = E{[log +γ M log +γ W] + } 3 We now study the achievable secrecy rate of different transission schees in the following A MRT Theore 5: The exact average secrecy rate of MRT schee can be expressed in closed-for as 3 on the top of the next page Proof: See Appendix G While 3 provides the exact average secrecy rate, the expression are too coplex to yield insightful inforation Motivated by this, we now look into the high SNR regie, where the secrecy rate is dictated by two key paraeters known as the high SNR slope S and the high SNR power offset L [3], ie, C = S log L 33 To this end, we have the following key result: Proposition 6: For the MRT schee, the high SNR slope is given by S MRT S MRT and the high SNR power offset L MRT L MRT = ln k λ P ΓN G3 3 =, 34 is given by +ψn+ψn + k λ P N,, 35 Proof: See Appendix H We note that the high SNR slope is also known as the axiu ultiplexing gain or the nuber of degrees of freedo [35] According to 34, the high SNR slope is one because we assue that the legitiate user only eploys a single antenna in this syste In addition, we observe that the wiretap channel only reflects the high SNR power offset It is also easy to see that the asyptotic average secrecy rate is an increasing function with respect to k and λ P, indicating that increasing the transit power of the PB is always beneficial and the secrecy rate increases when PB is close to the source

8 7 C MRT = TABLE I: Coparison of the proposed schees Schee CSI requireent Secrecy diversity order Outage perforance MRT h M N Second best TAS Criterion Index of the entry of h M N Third best TAS Criterion Index of the entry of h W Worst TAS Criterion 3 h M and h W N Best ΓN N k= N k k k= p= k λ P k+p+p! k k p ΓN k +p+ k λ P G 3 3 k λ P N k,, G k λ P p+ + λm + ] 3 N k,, B TAS Criterion We now consider the TAS Criterion schee, and we have the following key result: Theore 6: The exact average secrecy rate of TAS criterion schee can be expressed in closed-for as 36 on the top of the next page Proof: The proof follows siilar lines as that of Theore 5, hence is oitted We now look into the high SNR regie, and present the high SNR etrics in the following proposition Proposition 7: For the TAS criterion schee, the high SNR slope S TAS is given by S TAS and the high SNR power offset L TAS N L TAS = ln k λ P + N k k k= ΓN G3 3 =, 37 is given by lnk +ψ+ψn+ k λ P N,, 38 Proof: The proof follows siilar lines as that of Proposition 6, hence is oitted C TAS Criterion We now analyze the average secrecy rate of the syste with the TAS Criterion schee, and we have the following key result: Theore 7: The exact average secrecy rate of TAS criterion schee can be expressed in closed-for as C TAS = ΓN G 3 3 k λ P N,, + N N,, [ G 3 3 k λ P ] 39 Proof: The proof follows siilar lines as that of Theore 5, hence is oitted Having obtained the exact average secrecy rate of TAS Criterion schee, we now look into the asyptotic regie Proposition 8: For the TAS criterion schee, the high SNR slope S TAS is given by and the high SNR power offset L TAS L TAS = ln k λ P ΓN G3 3 S TAS =, 4 is given by +ψ+ψn + N k λ P N,, 4 Proof: The proof follows siilar lines as that of Proposition 6, hence is oitted D TAS Criterion3 We now ove to the TAS Criterion 3 schee, and we obtain the following key result: Theore 8: The average secrecy rate of TAS criterion3 schee can be approxiated by C TAS3 G 3 33 N k= + Γk +ΓN k N,+k N,+k N,+k N,k N 4 Proof: See Appendix I We now look into the high SNR regie, and present the high SNR etrics in the following proposition Proposition 9: For the TAS criterion3 schee, the high SNR slope S TAS3 is given by S TAS3 =, 43 and the high SNR power offset L TAS3 is given by L TAS3 = ln + N N N + N k k Proof: See Appendix J k= k 44

9 8 C TAS = ΓN N N k+ k k= [ G 3 k 3 k λ P N,, G 3 3 k + k λ P N,, ] 36 V NUMERICAL RESULTS In this section, we present nuerical results to verify the theoretical expressions Unless otherwise stated, we set the source transission rate as R S = bit/s/hz, the energy conversion efficiency as η = 8 and the tie switching ratio as θ = 5 The Nakagai- paraeter is set to be = 4, which corresponds to a Rician factor of K = 3+ The transit power of the PB to the noise ratio as PS N = db, the channel variance as λ P = and = Also, we set ρ = PS N and ρ = PS N to denote the average SNR of the ain channel and the wiretap channel, respectively Secrecy Outage Probability N = 3 4 Monte Carlo Siulation Analytical High SNR Approxiation ρ db Fig : Secrecy outage probability versus ρ with different N for the MRT schee Fig plots the secrecy outage probability versus ρ with different N for the MRT schee As illustrated, the analytical results are in exact agreeent with the Monte Carlo siulations, which deonstrates the correctness of the analytical expression In addition, the high SNR results accurately predict the secrecy diversity order and the secrecy array gain, and increasing N substantially enhances the secrecy outage perforance by achieving a higher secrecy diversity gain Fig 3 illustrates the secrecy outage probability of three different TAS schees Once again, we observe that the analytical curves are in perfect agreeent with the Monte Carlo siulation results and the high SNR approxiation are sufficiently tight for all curves As expected, the TAS Criterion schee only attains unit diversity order, while the other two TAS schees achieves a full diversity order of N In addition, it is observed that the TAS Criterion 3 schee yields the best secrecy outage perforance However, the TAS Criterion schee tends to outperfor the TAS Criterion schee in the low SNR regie, and then becoes inferior as the operating SNR becoes sufficiently high Fig 4 exaines the average secrecy rate of the MRT schee We observe that the high SNR slope of all the curves is one, which corroborates the theoretical analysis presented Secrecy Outage Probability TAS Criterion TAS Criterion TAS Criterion 3 Monte Carlo Siulation Analytical High SNR Approxiation ρ db Fig 3: Secrecy outage probability versus ρ for different TAS schees with N = 3 Average secrecy rate bits/s/hz Monte Carlo Siulation Analytical High SNR Approxiation N = ρ db Fig 4: Average secrecy rate versus ρ with different N for the MRT schee in previous section Nevertheless, increasing N iproves the average secrecy rate by decreasing the high SNR power offset However, the benefit of increasing the nuber of antennas N gradually diinishes when N is sufficiently large Fig 5 investigates the ipact of distance between Alice and Eve on the average secrecy rate for different TAS schees As expected, the TAS Criterion 3 schee always attains the best perforance At the low ρ regie, naely, relatively large distance between Alice and Eve or sall, the TAS Criterion schee outperfors the TAS Criterion schee However, the opposite holds when the distance decreases, ie, becoes large This phenoenon is quite intuitive, since when the average channel gain of the wiretap channel is better than that of the ain channel, selecting the worst antenna as per the TAS Criterion schee substantially degrades the capacity of the wiretap channel, thereby resulting in a larger secrecy perforance gain than the TAS Criterion schee

10 9 Average secrecy rate bits/s/hz TAS Criterion TAS Criterion TAS Criterion 3 = = ρ db Fig 5: Average secrecy rate versus ρ for different TAS schees with N = 3 Average secrecy rate bits/s/hz TAS Criterion TAS Criterion TAS Criterion 3 N = ρ db 55 5 N = 3 Fig 6: Average secrecy rate versus ρ for different TAS schees Fig 6 copares the average secrecy rate for different TAS schees Once again, we observe that the high SNR slopes are one The TAS Criterion schee outperfors the TAS Criterion schee with a large In addition, the nuber of antennas N has a significant ipact on the perforance of TAS schees For sall N, ie, N = 3, all the three TAS schees attain siilar secrecy rate While for large N, ie, N =, the secrecy rate difference becoes uch ore pronounced Fig 7 depicts the ipact of tie split paraeter θ on the secrecy perforance of different schees Specifically, we adopt the effective throughput as the perforance easure as in [34] Hence, when the source transits at a constant rate R S, the average throughput can be evaluated by R = P out R S θ, while when the source transits at a varying rate adapting to the secrecy rate, the throughput is given by R = θ C It is observed that, in all cases, the effective throughput first increases along with θ, and then start to decrease after reaching the axiu point, indicating that there exists a unique optial tie split paraeter θ In addition, we see that, with optiized tie split paraeter θ, the MRT schee achieves the highest throughput as expected Also, it is observed that the TAS Criterion schee outper- Throughput bits/s/hz Throughput bits/s/hz MRT TAS Criterion TAS Criterion θ a Rθ = P outr S θ MRT TAS Criterion TAS Criterion θ b Rθ = θ C Fig 7: Effective throughput versus θ for different schees with N = and = fors the TAS Criterion The reason is that we have set = and = in the siulations, a scenario where the average gain of the ain channel is worse than the wiretap channel Hence, the ain channel capacity enhanceent due to selection of the strongest channel in TAS Criterion schee is rather insignificant copared to the wiretap channel capacity degradation due to the selection of the weakest channel in TAS Criterion schee VI CONCLUSION In this paper, we have investigated the secrecy perforance of the wirelessly powered wiretap channels For both MRT and TAS schees, exact analytical expressions and asyptotic approxiations are presented, which facilitate the extraction of key insights of the achievable secrecy outage probability and average secrecy rate perforance The findings of the paper suggest that, with CSI of the ain channel eg, MRT and TAS Criteria and 3, the syste can achieve substantial secrecy diversity gain On the other hand, without the CSI of the ain channel eg, TAS Criterion, no diversity gain can be attained, which indicates the critical iportance of CSI in the design of practical systes

11 APPENDIX A PROOF OF THEOREM We start by expressing the SNR given in 6 and 7 as γ MRT M = k y hp y hm, and γ MRT W = k y hp y hw, 45 where k = ηps N θ θ, y h P = h P, y hm = h M and y hw = ht W h M h M It is straightforward to show that the probability density function pdf of y hp follows a gaa distribution with shape paraeter N and scale paraeter λ P / given by [36] N f yhp x = x N e λ x P, 46 ΓN λ P and the pdf of y hm follows a chi-square distribution with N degrees of freedo given by [37] f yhm x = xn λ N M ΓNe x 47 In addition, according to [38], y hw follows an exponential distribution with pdf f yhw x = e x, 48 and is independent of y hm As such, the secrecy outage probability can be written as Pout MRT +k y hp y hm R S = P k, 49 +k y hp y hw where k = RS Conditioned on y hp and y hw, with the help of [, Eq 335], we obtain P MRT out R S y hp,y hw = = e k k y k y h W hp N k= k k y hp +k y hw xn λ N M ΓNe x dx k k y hp + k y hw k 5 By applying the binoial expansion x + x n = k x x n k, 5 can be further expressed as n n k= k N Pout MRT R S y hp,y hw = e k k y hp k k y hp e k k k x k x k= p= p e k y h W ΓN k p!k p! k p k y hw 5 λ P Noticing that the RV y hp is decoupled with y hw, the expectation can be taken separately Hence, with the help of [, Eq 3479], we obtain p x N N e λ x P dx = ΓN k k λ P N+p K N p k k λ P 5 Siilarly, invoking [, Eq 336], we have k p e k x k x e x dx = k p! k k p +k k p+ 53 To this end, pulling everything together yields the desired result APPENDIX B PROOF OF PROPOSITION Starting fro 49, conditioned on y hp and y hm, we have P MRT out R S y hp,y hm = Prob y hm > k k y hp = Prob y hm > k k y hp k= y h M k k k k y hp e yh M e x dx k k λ + W k k y hp 54 k k y hp = With the help of [, Eq 335] and e k k, k y hp conditioned on yhp, the outage probability can be expressed as P MRT out R S y hp = e k k y hp e k N k y hp k= k=n k k + k y hp k k k y hp + λm k N k 55 Then, averaging overy hp, with the help of [, Eq 3479], the secrecy outage probability can be coputed as 56 on the top of next page Expanding the Bessel function by [, Eq 8446] and oitting the high order ites yield P MRT R S = k=n N k= k k λ P k k k λ P + λm k N k k ΓN k + ΓN ΓN k 57 ΓN By oitting the high order ites, the desired result can be obtained APPENDIX C PROOF OF THEOREM Based on and, we set y hm = h M,k and y hw = h W,k In this case, since the selected antenna corresponds to a rando transit antenna for the eavesdropper, the pdf of y hw can be expressed as f yhw x = e x Now, with soe siple algebraic anipulations, the cuulative distribution function cdf of y hm can be shown as x F yhm x = N e t dt = e x N 58

12 P MRT out R S = k=n k k λ P k ΓN N k= k k λ P k k k λ P N k + λm k N k ΓN K N k k k λ P k + k λ P N k K N k k 56 k λ P Hence the pdf of y hm can be obtained with a siple derivative as follows: f yhm x = N N e e x λ x M 59 Then, the desired result can be obtained by following siilar lines as in the proof of Theore APPENDIX D PROOF OF THEOREM 3 In this case, the strongest antenna corresponds to a rando transit antenna for the legitiate user, as such, the pdf of y hm can be expressed as f yhm x = e x Then, with soe siple algebraic anipulations, the cdf of y hw can be shown as N F yhw x = e t dt = e N λ x W x 6 Taking derivation of 6, the pdf of y hw can be expressed as f yhw x = N e N x 6 Then, the desired result can be obtained by following siilar lines as in the proof of Theore APPENDIX E PROOF OF PROPOSITION 3 By following the sae steps as in the proof of Proposition, we obtain N N +k ΓN N k K N k λ P P TAS out R S = k k λ P 6 Expanding the Bessel function and oitting the high order ites yield N out R S = N +k k +o N k λ P P TAS λ M 63 Then, the desired result can be obtained along with soe siple algebraic anipulations APPENDIX F PROOF OF THEOREM 4 The exact secrecy outage probability is difficult to characterize, instead, we apply the following approxiation as in [39] [ ] + +γm C S = log [ log +γ W ] + = γm γ W [ log hm,k ] + 64 h W,k It is worth pointing out that, such approxiation is reasonably tight and becoes asyptotically exact in the high SNR regie Then, we can define a new variable as follows X = ax i=,,n hid h ie 65 Along with soe siple algebraic anipulations, the cdf of X can be coputed as N F X x = e t e y dtdy y λ x W N x = 66 x+ λm Taking derivation of 66, the pdf of X can be expressed as f X x = N x N x+ λm N+ 67 To this end, the desired result can be expressed as F X k APPENDIX G PROOF OF THEOREM 5 Starting fro 3, conditioned on y hp, by following the sae steps as in [3], we forulate the average secrecy rate as C MRT = = k y hp +k y hp x F y hw x k y Γ hp e x +k y hp x F yhm x dx x N, ΓN dx 68 Invoking [, Eq 3383] and expanding the incoplete Gaa function, the average secrecy rate can be coputed

13 C MRT = N k= k k e k y hp N k y hp Γ k= p=, k k+p k y hp e k y hp + λ M k y hp k p! Γ, k y hp + k y hp p+ k y hp + p+ 69 as 69 on the top of the page The next step is to average over y hp Here, we set A = N k k N k ΓN λ P k= x N k e λ x+ P k x Γ, k x dx 7 With the help of [, Eq 83533] and [, Eq 3479], 7 can be further expressed as A = N k= k k k ΓN λ P 4x N k+ x + K N k x k λ P Invoking [, Eq 65657], we have A = N k= k λ P k N k ΓN k + ΓN N+k dx 7 k N k+ k λ P S N+k,N k k λ P 7 With the help of [, Eq 9346] and [, Eq 935], we obtain A = N k k= G 3 3 k ΓN k λ P k λ P N k,, 73 To this end, by following the sae steps and utilizing [, Eq 336], the desired result can be obtained APPENDIX H PROOF OF PROPOSITION 6 Capitalizing on the general fraework proposed in [3] for the evaluation of asyptotic average secrecy rate, conditioned on y hp, we have C = A B = k y hp +k y hp x lnk y hp xf yhm xdx F yhw x dx 74 With the help of [, Eq 435], A can be coputed as A = log + ln k λ P +ψn+ψn 75 The calculation of B is exactly the sae as C above Then we have B = ΓN G3 3 k λ P 76 N,, The desired result then follows iediately APPENDIX I PROOF OF THEOREM 8 Starting fro the definition, we have C TAS3 = Substituting 67 into 77 yields C TAS3 = N λ M logxf X xdx 77 lnx x N x+ λm N+ dx 78 Making a change of variable t = x and utilizing [4, Eq 8465], 78 can be alternatively written as C TAS3 = N = N λ M λ M t+ N lnt+ N+ dt t++ λm G t, t+ N, t++ λm N+ dt 79 Applying the binoial expansion and utilizing [, Eq 785] yield the desired result APPENDIX J PROOF OF PROPOSITION 9 By taking the general for, we obtain C = A B = lnxf yhm xdx lnyf yhw ydy, 8 where the two pdfs f yhm x and f yhw x have been derived in [4] as f yhm x = NxN x λ N Γ N,, 8 M

14 3 and f yhw x = NN N N x k k+ k k= λ k+ Γ W k, x 8 For A, by utilizing [, Eq 835] and [, Eq 435], we obtain A = ln +ψ 83 N Following the siilar lines, B can be coputed as B = N N ln +ψ+ N + k k k= The desired result then follows iediately REFERENCES k 84 [] R Zhang and C Ho, MIMO broadcasting for siultaneous wireless inforation and power transfer, IEEE Trans Wireless Coun, vol, no 5, pp 989, May 3 [] A A Nasir, X Zhou, S Durrani, and R Kennedy, Relaying protocols for wireless energy harvesting and inforation processing, IEEE Trans Wireless Coun, vol, no 7, pp , July 3 [3] L Liu, R Zhang, and K Chua, Wireless infoation and power transfer: A dynaic power splitting approach, IEEE Trans Coun, vol 6, no 9, pp 399 4, Sep 3 [4] C Zhong, H A Suraweera, G Zheng, I Krikidis, and Z Zhang, Wireless inforation and power transfer with full duplex relaying, IEEE Trans Coun, vol 6, no, pp , Oct 4 [5] Z Ding, S M Perlaza, I Esnaola, and H V Poor, Power allocation strategies in energy harvesting wireless cooperative networks, IEEE Trans Wireless Coun, vol 3, no, pp , Feb 4 [6] Z Ding, C Zhong, D Ng, M Peng, H A Suraweera, R Schober, and H V Poor, Application of sart antenna technologies in siultaneous wireless inforation and power transfer, IEEE Coun Mag, vol 53, no 4, pp 86 93, Apr 5 [7] H Chen, Y Li, J L Rebelatto, B F Uchoa-Filho, and B Vucetic, Harvest-then-cooperate: Wireless-powered cooperative counications, IEEE Trans Signal Process, vol 63, no 7, pp 7 7, Apr 5 [8] C Zhong, G Zheng, Z Zhang, and G Karagiannids, Optiu wirelessly powered relaying, IEEE Signal Processing Lett, vol, no, pp 78 73, Oct 5 [9] K Huang, C Zhong, and G Zhu, Soe new research trends in wirelessly powered counications, IEEE Wireless Coun, vol 3, no, pp 9 7, 6 [] S Bi, C Ho, and R Zhang, Wireless powered counication: Opportunities and challenges, IEEE Coun Mag, vol 53, no 4, pp 7 5, Apr 5 [] A Wyner, The wire-tap channel, Bell Syst Tech J, vol 54, no 8, pp , Oct 975 [] L Liu, R Zhang, and K-C Chua, Secrecy wireless inforation and power transfer with MISO beaforing, IEEE Trans Signal Process, vol 6, no 7, pp , Apr 4 [3] H Zhang, C Li, Y Huang, and L Yang, Secure beaforing for SWIPT in ultiuser MISO broadcast channel with confidential essages, IEEE Coun Lett, vol 9, no 8, pp , Aug 5 [4] D Ng, E S Lo, and R Schober, Robust beaforing for secure counication in systes with wireless inforation and power transfer, IEEE Trans Wireless Coun, vol 3, no 8, pp , Aug 4 [5] Q Li, Q Zhang, and J Qin, Secure relay breaforing for siulatneous wireless inforation and power transfer in nonregenerative relay networks, IEEE Trans Veh Technol, vol 63, no 5, pp , June 4 [6] B Zhu, J Ge, Y Huang, Y Yang, and M Lin, Rank-two beafored secure ulticasting for wireless inforation and power transfer, IEEE Signal Process Lett, vol, no, pp 99 3, Feb 4 [7] D Ng, E S Lo, and R Schober, Multiobjective resource allocation for secure counication in cognitive radio networks with wireless inforation and power transfer, IEEE Trans Veh Technol, vol 65, no 5, pp , May 6 [8] X Huang, Q Li, Q Zhang, and J Qin, Power allocation for secure OFDMA systes with wireless inforation and power transfer, IEEE Electronics Lett, vol 5, no 3, pp 9 3, Jan 4 [9] K Huang and X Zhou, Cutting the last wires for obile counications by icrowave power transfer, IEEE Coun Mag, vol 53, no 6, pp 86 93, June 5 [] K Huang and V K N Lau, Enabling wireless power transfer in cellular networks: Architecture, odeling and deployent, IEEE Trans Wireless Coun, vol 3, no, pp 9 9, Feb 4 [] Y Liu, L Wang, S A R Zaidi, M Elkashlan, and T Q Duong, Secure DD counication in large-scale cognitive cellular networks: A wireless power transfer odel, IEEE Trans Coun, vol 64, no, pp 39 34, Jan 6 [] I S Gradshteyn and I M Ryzhik, Table of Integrals, Series and Products, 6th Ed San Diago: Acadeic Press, [3] M S Trotter, C R Valenta, G A Koo, B R Marshall, and G D Durgin, Multi-antenna techniques for enabling passive RFID tags and sensors at icrowave frequencies, in Prof IEEE International Conf RFID, pp 7, Orlando, FL, USA, Apr [4] M Gregori and M Payaro, Optial power allocation for a wireless ulti-antenna energy harvesting node with arbitrary input distribution, in Proc IEEE International Conf on Counications, pp , Ottawa, ON, Canada, June [5] M Bloch, J Barros, M R D Rodrigues, and S W McLaughlin, Wireless inforation-theoretic security, IEEE Trans Inf Theory, vol 54, no 6, pp , June 8 [6] L Dong, Z Han, A P Petropulu, and H V Poor, Iproving wireless physical layer security via cooperating relays, IEEE Trans Signal Process, vol 58, no 3, pp , Mar [7] Y Zou, X Wang, and W Shen, Optial relay selection for physicallayer security in cooperative wireless networks, IEEE J Sel Areas Coun, vol 3, no, pp 99-, Oct 3 [8] Y Huang, F S Al-Qahtani, T Q Duong, and J Wang, Secure transission in MIMO wiretap channels using general-order transit antenna selection with outdated CSI, IEEE Trans Coun, vol 63, no 8, pp , Aug 5 [9] S Hessien, F S Al-Qahtani, R M Radaydeh, C Zhong, and H Alnuweiri, On the secrecy enhanceent with low-coplexity largescale transit selection in MIMO generalized coposite fading, IEEE Wireless Coun Lett, vol 4, no 4, pp 49 43, Aug 5 [3] F S Al-Qahtani, C Zhong, and H M Alnuweiri, Opportunistic relay selection for secrecy enhanceent in cooperative networks, IEEE Trans Coun, vol 63, no 5, pp , May 5 [3] L Wang, N Yang, M Elkashlan, P L Yeoh, and J Yuan, Physical layer security of axial ratio cobining in two-wave with diffuse power fading channels, IEEE Trans Infor Foren Sec, vol 9, no, pp 47 58, Feb 4 [3] Z Ding, S M Perlaza, I Esnaola, and H V Poor, Power allocation strategies in energy harvesting wireless cooperative networks, IEEE Trans Wireless Coun, vol 3, no, pp , Feb 4 [33] G Zhu, C Zhong, H Suraweera, G K Karagiannids, Z Zhang, and T Tsiftsis, Wireless inforation and power transfer in relay systes with ultiple antennas and interference, IEEE Trans Coun, vol 63, no 4, pp 4 48, Apr 5 [34] C Zhong, X Chen, Z Zhang, and G K Karagiannidis, Wirelesspowered counications: Perforance analysis and optiization, IEEE Trans Coun, vol 63, no, pp , Dec 5 [35] D Tse and P Viswanath, Fundaentals of Wireless Counication, Cabridge, UK: Cabridge Univ Press, 5 [36] A M Magableh and M M Matalgah, Capacity of SIMO systes over non-identically independent Nakagai- channels, in Proc IEEE Sarnoff Syposiu, Nassau Inn, Princeton, NJ, April 7, pp 5 [37] M K Sion and M S Alouini, Digital Counication over Fading Channels: A Unified Approach to Perforance Analysis, Hoboken, NJ: Wiley, [38] A Shah and A M Haiovich, Perforance analysis of axial ratio cobining and coparison with optiu cobining for obile radio counications with cochannel interference, IEEE Trans Veh Technol, vol 49, no 4, pp , July [39] I Krikidis, Opportunistic relay selection for cooperative networks with secrecy constraints, IET Coun, vol 4, no 5, pp , Oct

15 4 [4] A P Prudnikow, Y A Brychkov, and O I Marchev, Integrals and Series: More Special Functions, vol 3, New York, NY, USA: Gordon and Breach, 99 [4] K Tourki, F A Khan, K A Qaraqe, H Yang, and M Alouini, Exact perforance analysis of MIMO cognitive radio systes using transit antenna selection, IEEE J Sel Areas Coun, vol 3, no 3, pp , Mar 4 Xin Jiang S 6 received the BS degree in inforation and counication engineering fro Zhejiang University, Hangzhou, China, in 5 He is currently working towards his MS degree in the college of inforation science and electronic engineering at Zhejiang University His research interests include physical layer security and wireless powered counications Trung Q Duong S 5, M, SM 3 received his PhD degree in Telecounications Systes fro Blekinge Institute of Technology BTH, Sweden in Since 3, he has joined Queen s University Belfast, UK as a Lecturer Assistant Professor His current research interests include physical layer security, energy-harvesting counications, cognitive relay networks He is the author or co-author of 9 technical papers published in scientific journals and presented at international conferences Dr Duong currently serves as an Editor for the IEEE TRANSACTIONS ON COMMUNICATIONS, IEEE COMMUNICATIONS LETTERS, IET COMMUNICATIONS, WILEY TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, and ELECTRONICS LETTERS He has also served as the Guest Editor of the special issue on soe ajor journals including IEEE JOURNAL IN SELECTED AREAS ON COMMUNI- CATIONS, IET COMMUNICATIONS, IEEE WIRELESS COMMUNICATIONS MAGAZINE, IEEE COMMUNICATIONS MAGAZINE, EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, EURASIP JOUR- NAL ON ADVANCES SIGNAL PROCESSING He was awarded the Best Paper Award at the IEEE Vehicular Technology Conference VTC-Spring in 3, IEEE International Conference on Counications ICC 4 He is the recipient of prestigious Royal Acadey of Engineering Research Fellowship 5- Caijun Zhong S 7-M -SM 4 received the BS degree in Inforation Engineering fro the Xi an Jiaotong University, Xi an, China, in 4, and the MS degree in Inforation Security in 6, PhD degree in Telecounications in, both fro University College London, London, United Kingdo Fro Septeber 9 to Septeber, he was a research fellow at the Institute for Electronics, Counications and Inforation Technologies ECIT, Queens University Belfast, Belfast, UK Since Septeber, he has been with Zhejiang University, Hangzhou, China, where he is currently an associate professor His research interests include assive MIMO systes, full-duplex counications, wireless power transfer and physical layer security Dr Zhong is an Editor of the IEEE TRANSACTIONS ON WIRELESS COM- MUNICATIONS, IEEE COMMUNICATIONS LETTERS, EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, and JOURNAL OF COMMUNICATIONS AND NETWORKS He is the recipient of the 3 IEEE CoSoc Asia-Pacific Outstanding Young Researcher Award He and his coauthors has been awarded a Best Paper Award at the WCSP 3 He was an Exeplary Reviewer for IEEE TRANSACTIONS ON COMMUNICATIONS in 4 Theodoros A Tsiftsis S, M 4, SM was born in Laia, Greece, in 97 He received the BSc degree in physics fro the Aristotle University of Thessaloniki, Greece, in 993, the MSc degree in digital systes engineering fro the Heriot-Watt University, Edinburgh, UK, in 995, the MSc degree in decision sciences fro the Athens University of Econoics and Business, Greece, in, and the PhD degree in electrical engineering fro the University of Patras, Greece, in 6 He joined the Departent of Electrical Engineering at the Technological Educational Institute of Central Greece in February Currently, he is Associate Professor of Counication Technologies in the Departent of Electrical and Electronic Engineering at the School of Engineering of the Nazarbayev University, Astana, Kazakhstan His research interests include the broad areas of cooperative counications, counication theory, wireless counications, and optical wireless counication systes Dr Tsiftsis acts as reviewer for several international journals and he was eber of the Editorial Boards of IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY and IEEE COMMUNICATIONS LETTERS Currently he is an Area Editor for Wireless Counications II of the IEEE TRANSACTIONS ON COMMUNICATIONS Xiaoing Chen M -SM 4 received the BSc degree fro Hohai University in 5, the MSc degree fro Nanjing University of Science and Technology in 7 and the Ph D degree fro Zhejiang University in, all in electronic engineering He is currently with the College of Electronic and Inforation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China Since Feberuary 5, he is a Huboldt Resarch Fellow at the Institute for Digital Counications, University of Erlangen-Nürnberg, Erlangen, Gerany His research interests ainly focus on ultiple-antenna techniques, wireless security, interference network and wireless power transfer, etc Dr Chen serves as an Associate Editor for the IEEE ACCESS and an Editor for the IEEE COMMUNICATIONS LETTERS He was honoured as an Exeplary Reviewer of the IEEE Counications Letters in 4 and the IEEE Transactions on Counications in 5 Zhaoyang Zhang M received his PhD degree in counication and inforation systes fro Zhejiang University, China, in 998 He is currently a full professor with the Departent of Inforation Science and Electronic Engineering, Zhejiang University His research interests are ainly focused on inforation theory and coding theory, signal processing for counications and in networks, and their applications in the next generation wireless obile counication systes He has co-authored ore than 5 refereed international journal and conference papers as well as two books in the above areas He was a corecipient of several conference Best Paper Awards / Best Student Paper Award He is currently serving as Editor for IEEE TRANSACTIONS ON COMMUNICATIONS, IET COMMUNICATIONS and soe other international journals He has served or is serving as TPC Co-Chair or Syposiu Co-Chair for any international conferences like WCSP 3, ICUFN//3, and Globeco 4 Wireless Counications Syposiu, etc

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

On the Design of MIMO-NOMA Downlink and Uplink Transmission

On the Design of MIMO-NOMA Downlink and Uplink Transmission On the Design of MIMO-NOMA Downlink and Uplink Transission Zhiguo Ding, Meber, IEEE, Robert Schober, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract In this paper, a novel MIMO-NOMA fraework for

More information

Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels

Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Xiaojun Tang WINLAB, Rutgers University Ruoheng Liu Princeton University Predrag Spasojević WINLAB, Rutgers University H. Vincent

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ

More information

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc 3rd International Conference on Machinery, Materials and Inforation echnology Applications (ICMMIA 015) Sparse beaforing in peer-to-peer relay networs Yunshan ou a, Zhijuan Qi b, Jianhua Chenc College

More information

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining Secrecy Outage erformance of Cooperative Relay Network With Diversity Combining Khyati Chopra Dept. of lectrical ngineering Indian Institute of Technology, Delhi New Delhi-110016, India mail: eez148071@ee.iitd.ac.in

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

Rateless Codes for MIMO Channels

Rateless Codes for MIMO Channels Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Error Exponents in Asynchronous Communication

Error Exponents in Asynchronous Communication IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,

More information

4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015

4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015 4920 IEEE TRASACTIOS O COMMUICATIOS, VOL. 63, O. 12, DECEMBER 2015 Energy Efficient Coordinated Beaforing for Multicell Syste: Duality-Based Algorith Design and Massive MIMO Transition Shiwen He, Meber,

More information

Antenna Saturation Effects on MIMO Capacity

Antenna Saturation Effects on MIMO Capacity Antenna Saturation Effects on MIMO Capacity T S Pollock, T D Abhayapala, and R A Kennedy National ICT Australia Research School of Inforation Sciences and Engineering The Australian National University,

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters Coplexity reduction in low-delay Farrowstructure-based variable fractional delay FIR filters utilizing linear-phase subfilters Air Eghbali and Håkan Johansson Linköping University Post Print N.B.: When

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Rate of Channel Hardening of Antenna Selection Diversity Schemes and Its Implication on Scheduling

Rate of Channel Hardening of Antenna Selection Diversity Schemes and Its Implication on Scheduling SUBMITTED TO THE IEEE TRANSACTIONS ON INFORMATION THEORY Rate of Channel Hardening of Antenna Selection Diversity Schees and Its Iplication on Scheduling arxiv:cs/0703022v [cs.it] 5 Mar 2007 Dongwoon Bai,

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

Power-Controlled Feedback and Training for Two-way MIMO Channels

Power-Controlled Feedback and Training for Two-way MIMO Channels 1 Power-Controlled Feedback and Training for Two-way MIMO Channels Vaneet Aggarwal, and Ashutosh Sabharwal, Senior Meber, IEEE arxiv:0901188v3 [csit] 9 Jan 010 Abstract Most counication systes use soe

More information

PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE

PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE 1 Nicola Neretti, 1 Nathan Intrator and 1,2 Leon N Cooper 1 Institute for Brain and Neural Systes, Brown University, Providence RI 02912.

More information

Device-to-Device Collaboration through Distributed Storage

Device-to-Device Collaboration through Distributed Storage Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Construction of One-Bit Transmit-Signal Vectors for Downlink MU-MISO Systems with PSK Signaling

Construction of One-Bit Transmit-Signal Vectors for Downlink MU-MISO Systems with PSK Signaling 1 Construction of One-Bit Transit-Signal Vectors for Downlink MU-MISO Systes with PSK Signaling Gyu-Jeong Park and Song-Na Hong Ajou University, Suwon, Korea, eail: {net2616, snhong}@ajou.ac.kr and quantized

More information

Content Caching and Delivery in Wireless Radio Access Networks

Content Caching and Delivery in Wireless Radio Access Networks Content Caching and Delivery in Wireless Radio Access Networks Meixia Tao, Deniz Gündüz, Fan Xu, and Joan S. Pujol Roig Abstract arxiv:904.07599v [cs.it] 6 Apr 209 Today s obile data traffic is doinated

More information

Amplify-and-Forward Partial Relay Selection with Feedback Delay

Amplify-and-Forward Partial Relay Selection with Feedback Delay IEEE WCNC - PHY Aplify-and-Forward Partial Relay Selection with Feedbac Delay Madushana Soysa, Hial A. Suraweera, Chintha ellabura and Hari K. Garg Departent of Electrical and Coputer Engineering, University

More information

The κ-µ Shadowed Fading Model with Integer Fading Parameters

The κ-µ Shadowed Fading Model with Integer Fading Parameters The κ-µ Shadowed Fading Model with Integer Fading Paraeters F. Javier Lopez-Martinez, Jose F. Paris and Juan M. Roero-Jerez arxiv:69.37v [cs.it] Jan 7 Abstract We show that the popular and general κ-µ

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Detection and Estimation Theory

Detection and Estimation Theory ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer

More information

Handwriting Detection Model Based on Four-Dimensional Vector Space Model

Handwriting Detection Model Based on Four-Dimensional Vector Space Model Journal of Matheatics Research; Vol. 10, No. 4; August 2018 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Handwriting Detection Model Based on Four-Diensional Vector

More information

Matrix Inversion-Less Signal Detection Using SOR Method for Uplink Large-Scale MIMO Systems

Matrix Inversion-Less Signal Detection Using SOR Method for Uplink Large-Scale MIMO Systems Matrix Inversion-Less Signal Detection Using SOR Method for Uplin Large-Scale MIMO Systes Xinyu Gao, Linglong Dai, Yuting Hu, Zhongxu Wang, and Zhaocheng Wang Tsinghua National Laboratory for Inforation

More information

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel

More information

ANALYTICAL INVESTIGATION AND PARAMETRIC STUDY OF LATERAL IMPACT BEHAVIOR OF PRESSURIZED PIPELINES AND INFLUENCE OF INTERNAL PRESSURE

ANALYTICAL INVESTIGATION AND PARAMETRIC STUDY OF LATERAL IMPACT BEHAVIOR OF PRESSURIZED PIPELINES AND INFLUENCE OF INTERNAL PRESSURE DRAFT Proceedings of the ASME 014 International Mechanical Engineering Congress & Exposition IMECE014 Noveber 14-0, 014, Montreal, Quebec, Canada IMECE014-36371 ANALYTICAL INVESTIGATION AND PARAMETRIC

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks

The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks Mingyue Ji, Student Meber, IEEE, Giuseppe Caire, Fellow, IEEE, and Andreas F. Molisch, Fellow, IEEE arxiv:3.637v [cs.it] 8 Jul 05 The

More information

Adaptation to the Primary User CSI in Cognitive Radio Sensing and Access

Adaptation to the Primary User CSI in Cognitive Radio Sensing and Access Adaptation to e Priary User CSI in Cognitive Radio Sensing and Access Yuan Lu, Alexandra Duel-Hallen Departent of Electrical and Coputer Engineering Nor Carolina State University Raleigh, NC, 2766 {ylu8,

More information

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services Energy Efficient Predictive Resource Allocation for VoD and Real-tie Services Changyang She and Chenyang Yang 1 arxiv:1707.01673v1 [cs.it] 6 Jul 2017 Abstract This paper studies how to exploit the predicted

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

When Short Runs Beat Long Runs

When Short Runs Beat Long Runs When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long

More information

Identical Maximum Likelihood State Estimation Based on Incremental Finite Mixture Model in PHD Filter

Identical Maximum Likelihood State Estimation Based on Incremental Finite Mixture Model in PHD Filter Identical Maxiu Lielihood State Estiation Based on Increental Finite Mixture Model in PHD Filter Gang Wu Eail: xjtuwugang@gail.co Jing Liu Eail: elelj20080730@ail.xjtu.edu.cn Chongzhao Han Eail: czhan@ail.xjtu.edu.cn

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network 565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association

More information

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique

More information

Content-Type Coding. arxiv: v2 [cs.it] 3 Jun Linqi Song UCLA

Content-Type Coding. arxiv: v2 [cs.it] 3 Jun Linqi Song UCLA Content-Type Coding Linqi Song UCLA Eail: songlinqi@ucla.edu Christina Fragouli UCLA and EPFL Eail: christina.fragouli@ucla.edu arxiv:1505.03561v [cs.it] 3 Jun 015 Abstract This paper is otivated by the

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. IX Uncertainty Models For Robustness Analysis - A. Garulli, A. Tesi and A. Vicino

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. IX Uncertainty Models For Robustness Analysis - A. Garulli, A. Tesi and A. Vicino UNCERTAINTY MODELS FOR ROBUSTNESS ANALYSIS A. Garulli Dipartiento di Ingegneria dell Inforazione, Università di Siena, Italy A. Tesi Dipartiento di Sistei e Inforatica, Università di Firenze, Italy A.

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Linear Precoding for Large MIMO Configurations and QAM Constellations

Linear Precoding for Large MIMO Configurations and QAM Constellations 1 Linear Precoding for Large MIMO Configurations and QAM Constellations Abstract In this paper, the proble of designing a linear precoder for Multiple-Input Multiple-Output (MIMO systes in conjunction

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

4196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016

4196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016 4196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016 Linear Precoding ain for Large MIMO Configurations With QAM and Reduced Coplexity Thoas Ketseoglou, Senior Meber, IEEE, and Ender

More information

Green Inter-Cluster Interference Management in Uplink of Multi-Cell Processing Systems

Green Inter-Cluster Interference Management in Uplink of Multi-Cell Processing Systems IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Green Inter-Cluster Interference Manageent in Uplink of Multi-Cell Processing Systes Efstathios Katranaras, Meber, IEEE, Muhaad Ali Iran, Senior Meber, IEEE,

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

Data-Driven Imaging in Anisotropic Media

Data-Driven Imaging in Anisotropic Media 18 th World Conference on Non destructive Testing, 16- April 1, Durban, South Africa Data-Driven Iaging in Anisotropic Media Arno VOLKER 1 and Alan HUNTER 1 TNO Stieltjesweg 1, 6 AD, Delft, The Netherlands

More information

A DESIGN GUIDE OF DOUBLE-LAYER CELLULAR CLADDINGS FOR BLAST ALLEVIATION

A DESIGN GUIDE OF DOUBLE-LAYER CELLULAR CLADDINGS FOR BLAST ALLEVIATION International Journal of Aerospace and Lightweight Structures Vol. 3, No. 1 (2013) 109 133 c Research Publishing Services DOI: 10.3850/S201042862013000550 A DESIGN GUIDE OF DOUBLE-LAYER CELLULAR CLADDINGS

More information

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels ISIT7, Nice, France, June 4 June 9, 7 Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels Ahed A. Farid and Steve Hranilovic Dept. Electrical and Coputer Engineering McMaster

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

Finite-State Markov Modeling of Flat Fading Channels

Finite-State Markov Modeling of Flat Fading Channels International Telecounications Syposiu ITS, Natal, Brazil Finite-State Markov Modeling of Flat Fading Channels Cecilio Pientel, Tiago Falk and Luciano Lisbôa Counications Research Group - CODEC Departent

More information

THE Internet of Things (IoT) has been widely developed

THE Internet of Things (IoT) has been widely developed Coputation Rate Maxiization in UAV-Enabled Wireless Powered Mobile-Edge Coputing Systes Fuhui Zhou, Meber, IEEE, Yongpeng Wu, Senior Meber, IEEE, Rose Qingyang Hu, Senior Meber, IEEE, and Yi Qian, Senior

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

An improved self-adaptive harmony search algorithm for joint replenishment problems

An improved self-adaptive harmony search algorithm for joint replenishment problems An iproved self-adaptive harony search algorith for joint replenishent probles Lin Wang School of Manageent, Huazhong University of Science & Technology zhoulearner@gail.co Xiaojian Zhou School of Manageent,

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES

LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Journal of Marine Science and Technology, Vol 19, No 5, pp 509-513 (2011) 509 LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Ming-Tao Chou* Key words: fuzzy tie series, fuzzy forecasting,

More information

Analytical Model of Epidemic Routing for Delay-Tolerant Networks Qingshan Wang School of Mathematics Hefei University of Technology Hefei, China

Analytical Model of Epidemic Routing for Delay-Tolerant Networks Qingshan Wang School of Mathematics Hefei University of Technology Hefei, China Analytical Model of Epideic Routing for Delay-Tolerant etwors Qingshan Wang School of Matheatics Hefei University of Technology Hefei, China qswang@hfut.edu.cn Zygunt J. Haas School of Electrical and Coputer

More information

Support recovery in compressed sensing: An estimation theoretic approach

Support recovery in compressed sensing: An estimation theoretic approach Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Performance analysis of free-space optical communication systems over atmospheric turbulence channels H.E. Nistazakis 1 T.A. Tsiftsis 2 G.S.

Performance analysis of free-space optical communication systems over atmospheric turbulence channels H.E. Nistazakis 1 T.A. Tsiftsis 2 G.S. Published in IET Counications Received on 8th pril 8 Revised on 8th Noveber 8 doi:.49/iet-co.8. ISSN 75-868 Perforance analysis of free-space optical counication systes over atospheric turbulence channels

More information

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

Finite Horizon Throughput Maximization and Sensing Optimization in Wireless Powered Devices over Fading Channels

Finite Horizon Throughput Maximization and Sensing Optimization in Wireless Powered Devices over Fading Channels Finite Horizon Throughput Maxiization and Sensing Optiization in Wireless Powered Devices over Fading Channels Mehdi Salehi Heydar Abad, Ozgur Ercetin arxiv:1804.01834v2 [cs.it] 9 Sep 2018 Abstract Wireless

More information

HIGH RESOLUTION NEAR-FIELD MULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR MACHINES

HIGH RESOLUTION NEAR-FIELD MULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR MACHINES ICONIC 2007 St. Louis, O, USA June 27-29, 2007 HIGH RESOLUTION NEAR-FIELD ULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR ACHINES A. Randazzo,. A. Abou-Khousa 2,.Pastorino, and R. Zoughi

More information

Figure 1: Equivalent electric (RC) circuit of a neurons membrane

Figure 1: Equivalent electric (RC) circuit of a neurons membrane Exercise: Leaky integrate and fire odel of neural spike generation This exercise investigates a siplified odel of how neurons spike in response to current inputs, one of the ost fundaental properties of

More information

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals Estiation of ADC Nonlinearities fro the Measureent in Input Voltage Intervals M. Godla, L. Michaeli, 3 J. Šaliga, 4 R. Palenčár,,3 Deptartent of Electronics and Multiedia Counications, FEI TU of Košice,

More information

A note on the realignment criterion

A note on the realignment criterion A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Controlled Flooding Search with Delay Constraints

Controlled Flooding Search with Delay Constraints Controlled Flooding Search with Delay Constraints Nicholas B. Chang and Mingyan Liu Departent of Electrical Engineering and Coputer Science University of Michigan, Ann Arbor, MI 4809-222 Eail: {changn,ingyan}@eecs.uich.edu

More information

Numerical Studies of a Nonlinear Heat Equation with Square Root Reaction Term

Numerical Studies of a Nonlinear Heat Equation with Square Root Reaction Term Nuerical Studies of a Nonlinear Heat Equation with Square Root Reaction Ter Ron Bucire, 1 Karl McMurtry, 1 Ronald E. Micens 2 1 Matheatics Departent, Occidental College, Los Angeles, California 90041 2

More information

Minimum Rates Scheduling for MIMO OFDM Broadcast Channels

Minimum Rates Scheduling for MIMO OFDM Broadcast Channels IEEE Ninth International Syposiu on Spread Spectru Techniques and Applications Miniu Rates Scheduling for MIMO OFDM Broadcast Channels Gerhard Wunder and Thoas Michel Fraunhofer Geran-Sino Mobile Counications

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Compressive Distilled Sensing: Sparse Recovery Using Adaptivity in Compressive Measurements

Compressive Distilled Sensing: Sparse Recovery Using Adaptivity in Compressive Measurements 1 Copressive Distilled Sensing: Sparse Recovery Using Adaptivity in Copressive Measureents Jarvis D. Haupt 1 Richard G. Baraniuk 1 Rui M. Castro 2 and Robert D. Nowak 3 1 Dept. of Electrical and Coputer

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

A Note on the Applied Use of MDL Approximations

A Note on the Applied Use of MDL Approximations A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention

More information

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations Randoized Accuracy-Aware Progra Transforations For Efficient Approxiate Coputations Zeyuan Allen Zhu Sasa Misailovic Jonathan A. Kelner Martin Rinard MIT CSAIL zeyuan@csail.it.edu isailo@it.edu kelner@it.edu

More information

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations International Journal of Applied Science and Technology Vol. 7, No. 3, Septeber 217 Coparison of Stability of Selected Nuerical Methods for Solving Stiff Sei- Linear Differential Equations Kwaku Darkwah

More information