Performance analysis of piece-wise linear model of energy harvesting-based multiuser overlay spectrum sharing networks

S Solanki, PK Upadhyay, DB Da Costa… - IEEE Open Journal …, 2020 - ieeexplore.ieee.org
In this article, we investigate the performance of a piece-wise linear model of energy
harvesting-based multiuser overlay spectrum sharing system. Herein, an energy …

[HTML][HTML] Security performance analysis of relay networks based on-shadowed channels with rhis and cees

J Sun, X Wang, Y Fang, X Tian, M Zhu, J Ou… - … and Mobile Computing, 2022 - hindawi.com
This paper mainly describes the transmission reliability and physical layer security of
multiantenna decode-and-forward relay networks over the-shadowed fading distribution. We …

RF energy harvesting in hybrid two-way relaying systems with hardware impairments

S Solanki, V Singh, PK Upadhyay - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we investigate the performance of energy harvesting two-way relay systems in
the presence of transceiver hardware impairments (HIs). In order to improve the reliability of …

Exploiting multiple RISs and direct link for performance enhancement of wireless systems with hardware impairments

PT Tran, BC Nguyen, TM Hoang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, the performance of a wireless system, which is beneficial from utilization of
multiple reconfigurable intelligent surfaces (RISs) and the direct link between the source …

Physical layer security for cognitive multiuser networks with hardware impairments and channel estimation errors

X Jiang, P Li, Y Zou, B Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we investigate the physical layer security for a cognitive multiuser network
which is composed of multiple cognitive sources, a cognitive destination and an …

Securing multiuser underlay cognitive transmissions with hardware impairments and channel estimation errors

P Yan, X Ji, Y Zou, B Li - IEEE Transactions on Cognitive …, 2023 - ieeexplore.ieee.org
We investigate physical-layer security for a multiuser underlay cognitive system with
hardware impairments (HIs) and channel estimation errors (CEEs), which comprises …

Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

P Tran Tin, TN Nguyen, NQ Sang, T Trung Duy… - Entropy, 2019 - mdpi.com
In this paper, we propose a rateless codes-based communication protocol to provide
security for wireless systems. In the proposed protocol, a source uses the transmit antenna …

Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection

PT Tin, P Minh Nam, T Trung Duy, PT Tran, M Voznak - Sensors, 2019 - mdpi.com
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor
networks (WSNs). In the secondary network, a source transmits its data to a destination via …

[PDF][PDF] 基于硬件损伤的MIMO 异构网络波束成形算法

徐勇军, 谢豪, 陈前斌, 刘期烈 - 电子与信息学报, 2021 - jeit.ac.cn
由于多输入多输出(MIMO) 异构网络能够提高系统容量和实现更多的用户接入,
因此受到了学术界和工业界的广泛关注, 从而成为下一代通信系统的关键技术之一. 然而 …

I/Q imbalance and imperfect SIC on two-way relay NOMA systems

X Tian, Q Li, X Li, H Peng, C Zhang, KM Rabie… - Electronics, 2020 - mdpi.com
Non-orthogonal multiple access (NOMA) system can meet the demands of ultra-high data
rate, ultra-low latency, ultra-high reliability and massive connectivity of user devices (UE) …