- Advanced Wireless Communication Techniques
- Power Line Communications and Noise
- Cooperative Communication and Network Coding
- Error Correcting Code Techniques
- Advanced MIMO Systems Optimization
- Coding theory and cryptography
- Wireless Communication Security Techniques
- Wireless Communication Networks Research
- Energy Harvesting in Wireless Networks
- Underwater Vehicles and Communication Systems
- Cryptographic Implementations and Security
- Electromagnetic Compatibility and Noise Suppression
- graph theory and CDMA systems
- Energy Efficient Wireless Sensor Networks
- Cognitive Radio Networks and Spectrum Sensing
- Cellular Automata and Applications
- Ionosphere and magnetosphere dynamics
- Full-Duplex Wireless Communications
- GNSS positioning and interference
- Security in Wireless Sensor Networks
- PAPR reduction in OFDM
- Chaos-based Image/Signal Encryption
- Mobile Ad Hoc Networks
- Indoor and Outdoor Localization Technologies
- Earthquake Detection and Analysis
Newcastle University
2015-2024
University of St. Thomas - Minnesota
2024
University of Wolverhampton
2004
In this paper, we study different secrecy rate optimization techniques for a multiple-input–multiple-output (MIMO) channel, where multiantenna cooperative jammer is employed to improve secret communication in the presence of eavesdropper. Specifically, consider two problems, namely, power minimization and maximization. These problems are not jointly convex terms transmit covariance matrices legitimate transmitter jammer. To circumvent these nonconvexity issues, alternatively design matrix...
This paper investigates simultaneous wireless information and power transfer (SWIPT) for a multiple-input-single-output (MISO) secrecy channel. First, transmit beamforming without artificial noise (AN) is designed to achieve the rate maximization problem subject energy harvesting (EH) constraints. not convex, but this can be solved by applying bisection search sequence of associated minimization problems, each which using novel relaxation approach. Moreover, we extend our proposed algorithms...
This paper investigates secrecy rate optimization problems for a multiple-input-single-output (MISO) channel in the presence of multiple multiantenna eavesdroppers. Specifically, we consider power minimization and maximization this network. First, formulate problem based on assumption that legitimate transmitter has perfect state information (CSI) user eavesdroppers, where can be reformulated into second-order cone program (SOCP). In addition, provide closed-form solution transmit...
This letter investigates robust secrecy rate optimization techniques for a multiple-input-multiple-output (MIMO) wiretap channel in the presence of multiantenna eavesdropper. In particular, two problems are studied: power minimization with an outage constraint and maximization subject to transmit constraints. Here, it is assumed that legitimate transmitter has perfect state information (CSI) receiver imperfect CSI Both not convex terms covariance matrix constraint. Hence, we propose...
A novel unsupervised sparse component extraction algorithm is proposed for detecting micro defects while employing a thermography imaging system. The approach developed using the variational Bayesian framework. This enables fully automated determination of model parameters and bypasses need human intervention in manually selecting appropriate image contrast frames. An internal subsparse grouping mechanism adaptive fine-tuning strategy have been built to control sparsity solution....
Simultaneous wireless information and power transfer (SWIPT) in cooperative networks is studied, where multiple source–destination pairs establish a communication link via an energy harvesting (EH) relay. The relay employs splitting (PS) scheme to harvest the sent from each source, which it uses forward transmissions destinations. total transmission rate maximisation problem investigated subject transmit EH constraints, can be divided into node’s based on non‐cooperative strategy. This...
Two different synchronous downlink multiple-access schemes, interleave-division multiple access (IDMA) and code-division (CDMA), are considered for pragmatic underwater communications channels exhibiting extended multipath spread time variability. single-element DFE-IDMA DFE-CDMA receivers proposed that utilize chip-level adaptive decision feedback equalization (DFE) carrier phase tracking along with iterative interference cancellation (IC) channel coding. The receiver equations describing...
Spatial diversity is an effective method to mitigate the effects of fading, and when used in conjunction with low-density parity-check (LDPC) codes, it can achieve excellent error-correcting performance. Noise added at each branch combiner generally assumed be additive white Gaussian noise, but there are many applications where received signal impaired by noise a non-Gaussian distribution. In this paper, we derive exact bit-error probability different linear combining techniques on Rayleigh...
Spectrum sensing data falsification (SSDF) is one of the most dangerous attacks that can degrade reliability collaborative spectrum in cognitive radio (CR) networks. In this article, we propose a novel defense strategy to thwart SSDF by intelligently verifying sensory with assistance trusted nodes. The proposed scheme employs an efficient and fast reputation-based algorithm analyze behavior each user. Hence, not only will reliable be accepted central entity, but also, malicious users easily...
Wireless sensor networks for smart city applications can be widely deployed, but they also vulnerable to compromised by outsider attackers. It is, therefore, critical that the disseminated information is secured in terms of its confidentiality, availability, and authenticity. Many key management schemes have been proposed guarantee aforementioned requirements most popular depend on location generate required credentials. This paper presents a new location-dependent protocol (LKMP), called...
In this work, two efficient low complexity Antenna Selection (AS) algorithms are proposed for downlink Multi-User (MU) Massive Multiple-Input Multiple-Output (M-MIMO) systems with Matched Filter (MF) precoding. Both avoid vector multiplications during the iterative selection procedure to reduce complexity. Considering a system N antennas at Base Station (BS) serving K single-antenna users in same time-frequency resources, first algorithm divides available into groups, kth group containing...
This paper proposes the first complete soft-decision list decoding algorithm for Hermitian codes based on Koetter-Vardy's Reed-Solomon code algorithm. For codes, interpolation processes trivariate polynomials which are defined over pole basis of a curve. In this paper, interpolated zero condition polynomial with respect to multiplicity matrix M is redefined followed by proof validity scheme. also introduces new stopping criterion that tranforms reliability Pi M. Geometric characterisation...
In conventional communication systems, the noise at receiver is usually assumed to be Gaussian. However, this assumption not always valid if signal affected by impulsive noise. This paper analyzes theoretical bit error probability (BEP) of M-ary quadrature amplitude modulation (M-QAM) (M ≥ 4) on Rayleigh fading channels with that has an alpha stable distribution. The derived BEP can used evaluate performance wireless system and also provides a benchmark for determining coding gains....
Algebraic geometry is a branch of mathematics with many applications such as statistics, computer science and economics. It can also be applied to coding theory construct nonbinary block codes from curves impressive parameters e.g. large code lengths, high rates minimum distances. The design construction algebraic–geometric described, the performance evaluated over additive white gaussian noise (AWGN) Rayleigh fading channels make comparisons similar Reed–Solomon codes. Simulation results...
In this study, the performance of irregular low‐density parity check (LDPC) coded orthogonal frequency division multiplexing (COFDM) utilising 4096 quadrature amplitude modulation (4096‐QAM) is investigated over multipath power‐line communication (PLC) channel. The effective complex‐valued ratio distributions noise samples at zero‐forcing equaliser output considering both frequency‐selective PLCs, background and impulsive are derived, in addition to condition for optimum detection 4096‐QAM...
The power-line communication (PLC) channel causes information-bearing signals to be affected by impulsive noise and the effects of multipath fading. To mitigate these effects, we propose employment non-binary turbo codes, since error-correcting codes generally promise an enhanced performance in such harsh environments. In this paper, investigate turbo-codes on PLC channels that exhibit frequency selectivity with additive Middleton Class A compare a comparable binary turbo-coded system. order...
The carrier tracking loop in a GPS receiver is considered to be an important process but also weak link since the loss of signal lock can occur variety situations. Low carrier-to-noise ratios and highly dynamic environments are common scenarios for vehicular communication channel when random phase fluctuations environment common. We propose novel robust approach by dynamically integrating adaptive unscented Kalman filter assisted third-order order improve robustness capability accuracy dense...
This study proposes a novel physical layer authentication scheme, which uses the channel to generate tagged signal and determine random partial padding. The scheme utilises wireless gain between communication entities tag decide padding sequence for each symbol. Simulations different percentages using randomness provided by are carried out compare against traditional full shows improvement in error rate under same security performance. second of referee verification is introduced increase...
A Physical Unclonable Framework (PUF) is a detached hardware component or, the structural arrangement of that provides natural variations in physical parts semiconductor devices to generate unique and unpredictable identifiers based on challenging-to-replicate. In this case, PUFs are giving us tool utilise these create an unclonable identifier for your device. response or pattern characteristics device, difficult predict duplicate. This study aims introduce PUK device provide security...
The list decoding algorithm can outperform the conventional unique by producing a of candidate decoded messages. An efficient for algebraic-geometric (AG) codes and Reed-Solomon (RS) has been developed Guruswami Sudan, called Guruswami-Sudan (GS) algorithm. includes two steps: Interpolation Factorisation. To implement interpolation, Koetter proposed an iterative polynomial construction RS codes. By redefining over algebraic function fields, Koetter's also be applied to AG factorisation, Roth...
The use of wireless sensor networks for the purposes border surveillance is a very hot topic at moment. Such network comprises large numbers nodes, sparsely located over wide terrain, where generated data are collected by multiple sinks in secure head quarters. Due to its importance and criticality, disseminated through such vulnerable outsider attacks. Therefore, location-dependent key management scheme could be employed order provide security terms confidentiality authenticity. This paper...
In this study, the performance analyses of proposed turbo‐coded orthogonal frequency division multiplexing (T‐COFDM) are investigated over power‐line communication with lognormal channel gain based on derived effective complex‐valued ratio distributions individual and combined noise samples at zero‐forcing equaliser output. The in presence Nakagami‐m background interference (BI) noise, Middleton class A impulsive (MCAIN) their combination. turbo code has been improved by computing exact...