- Advanced Wireless Communication Technologies
- Energy Harvesting in Wireless Networks
- IoT Networks and Protocols
- Advanced MIMO Systems Optimization
- Wireless Communication Security Techniques
- Optical Wireless Communication Technologies
- Radar Systems and Signal Processing
- Advanced SAR Imaging Techniques
- Air Quality Monitoring and Forecasting
- Quantum Mechanics and Applications
- IoT and Edge/Fog Computing
- Image and Signal Denoising Methods
- Quantum Information and Cryptography
- Speech and Audio Processing
- Atmospheric chemistry and aerosols
- Network Security and Intrusion Detection
- Flow Measurement and Analysis
- Security in Wireless Sensor Networks
- Random Matrices and Applications
- Power Line Communications and Noise
- Guidance and Control Systems
- Photonic and Optical Devices
- Quantum Computing Algorithms and Architecture
- Ocular Disorders and Treatments
- Network Packet Processing and Optimization
Naval University of Engineering
2016-2025
Lancaster University
2018-2021
Xi'an Polytechnic University
2018
National Taiwan University of Science and Technology
2016
University of Electronic Science and Technology of China
2013
In this article, we investigate the application of user cooperation (UC) and non-orthogonal multiple access (NOMA) schemes for a wireless powered mobile edge computing (MEC) system under non-linear energy harvesting model, in which two single-antenna users first harvest from multi-antenna point (AP) integrated with an MEC server. Then, during computation offloading phase, both simultaneously offload tasks to server harvested energy, by performing NOMA protocol. To better enhance performance,...
In this paper, we study the robust beamforming design for a simultaneous wireless information and power transfer (SWIPT) enabled system, with cooperative non-orthogonal multiple access (NOMA) protocol applied. A novel NOMA scheme is proposed, where strong user better channel conditions adopts splitting (PS) acts as an energy-harvesting relay to transmit weak user. The presence of uncertainties considered incorporated in our formulations improve robustness communication reliability....
LoRa has been recognized as one of the most promising low-power wide-area (LPWA) techniques. Since devices are usually powered by batteries, energy efficiency (EE) is an essential consideration. In this paper, we investigate efficient resource allocation in networks to maximize system EE (SEE) and minimal (MEE) users, respectively. Specifically, our objective corresponding jointly exploiting user scheduling, spreading factor (SF) assignment, transmit power allocations. To solve them...
The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence untrustworthy network nodes, referred as internal eavesdroppers. To address this potential and reliability flaw, by assuming all users are untrusted, letter investigates effective secrecy throughput (EST) for a NOMA system, where near user serves an amplify-and-forward relay help forward information far user. Considering...
Deinterleaving pulses of various pulse repetition interval (PRI) modulation modes constitute a vital and challenging task for an electronic measures system (ESM). A deinterleaving method based on multi-receiver time-difference-of-arrival (TDOA) is proposed in this paper. Firstly, paper theoretically analyzes the distribution feature TDOA, providing basis deinterleaving. Then, SSC (Sorting Skipping Clustering)-DBSCAN algorithm to achieve TDOA clustering by pre-sorting traversing key points,...
To address the stringent demands of next-generation networks for massive connectivity, ultralow latency, and ultrahigh spectral efficiency, win–win integration reconfigurable intelligent surface (RIS) nonorthogonal multiple access (NOMA) is considered as a promising solution. In this article, we investigate downlink RIS-empowered NOMA system with short packet communications (SPCs) in presence hardware impairments at transceiver nodes. characterize performance proposed network, approximate...
With the wide deployment of wireless networks, attackers may exploit Wi-Fi network vulnerabilities to transfer data secretly, or covert communication channels spread malicious codes. The protocol formats reverse engineering technique can be used detect such attacks, however, previous works are focused on application layer analysis, and hardly work under scenarios that captured is only in binary format due lack semantics. In this paper, we propose a novel framework, which utilizes association...
Non orthogonal multiple access (NOMA) and mobile edge computing (MEC) are evolving as key enablers for fifth generation (5G) networks this combination can provide high spectral efficiency, improved quality-of-service (QoS), lower latency. This letter aims to minimize the transaction time difference of two NOMA paired users offloading data MEC servers by optimizing their transmission powers computational resources severs using a successive convex approximation method. The equalization reduces...
In this paper, we investigate energy efficiency for uplink LoRa, which is one of the most promising and widely deployed low-power wide-area (LPWA) networks. considered networks, explore user scheduling, spreading factor (SF) assignment, power allocation jointly. A nonconvex optimization problem maximizing system formulated, with targeted SNR requirement range as constraints each LoRa user. To solve problem, first propose a low-complexity suboptimal algorithm, includes energy-efficient...
This paper considers a hybrid wireless powered non-orthogonal multiple access (NOMA) enabled mobile edge computing (MEC) systems. The transmit energy beamforming, power and time allocations are jointly optimized to maximize the computation rate of strong user, while satisfying requirement weak user harvested constraints. optimal solution is proposed in semi-closed form by adopting Lagrange duality method. Simulation results show that system yields better performance than existing schemes.
Abstract Active‐passive composite monopulse radar (APCMR) enhances the anti‐jamming capability by combing advantages of active radars and passive radars. Previous studies have discussed effectiveness cross‐eye jamming against APCMR in a simplified scenario for isolating platform echo. In this paper, echo signals are jointly considered to analyse performance on APCMR. A mathematical model is established presence echo, evaluated compared terms gain its probability. order ensure both radars,...
This paper studies the secure transmission for downlink multiple-input single-output (MISO) non-orthogonal multiple access (NOMA) system in which imperfect channel state information (CSI) of eavesdropper links is considered. We propose novel robust beamforming strategies direct NOMA (DT NOMA) and cooperative jamming (CJ with a helper. formulate our problem as worst-case sum power minimization subject to secrecy rate constraint. The semidefinite relaxation (SDR) method firstly applied relax...
Carry out research on the variation rule of average mutual information between Alice and Eve I <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">AE</sub> , Bob xmlns:xlink="http://www.w3.org/1999/xlink">AB</sub> bit error rate q xmlns:xlink="http://www.w3.org/1999/xlink">e</sub> (AE), (AB), when eavesdropper uses same measurement basis as Bob, eavesdropping communication intercepting-retransmission pattern. Based symmetrical characteristic source...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
Abstract Precise radar pulse detection is the premise of electronic support measures. A constant false alarm rate (CFAR) algorithm based on difference box (DOB) filter proposed to realise low‐complexity and environment‐adaptive detection, principle behind revealed. Specifically, DOB adopted extract rising edges falling pulses, signal variation law probability density functions (PDFs) during process are first theoretically analysed. Based derived PDFs, dynamic threshold fixed factor for CFAR...
Abstract This article proposes a cooperative jamming (CJ) architecture based on the coded signal of interest (SOI). The CJ is superimposed SOI directly at transmitter, and authorized user reconstructs received cancels prior knowledge coding information, then different radiation patterns after cancellation are created for CJ, which effectively while retaining SOI. Eavesdropper, however, unaware information will cause significant loss to cancelling therefore unable achieve eavesdropping...
We investigate the robust beamforming design for a simultaneous wireless information and power transfer (SWIPT) enabled system, with cooperative non-orthogonal multiple access (NOMA) protocol applied. A novel NOMA scheme is proposed, where strong user better channel conditions adopts splitting (PS) acts as an energy-harvesting relay to forward decoded signal weak user. The presence of uncertainties considered by introducing outage-based constraints interference plus noise ratio (SINR)....
Based on the technical characteristics of leaky coaxial cables, application scenarios regional monitoring system and closed-area mobile communication for cables are first analyzed. Then structure diagram is introduced, radiation mechanism analysis method electromagnetic simulation model established by software HFSS. The direction pattern loss feature simulated results show that signal cable has uniform coverage low attenuation.
Physical-layer security has drawn ever-increasing attention in the next generation wireless communications. In this paper, we focus on studying secure communication an HPN-to-devices (HTD) network, which a new type of MAC spoofing attack is considered. To detect malicious attack, propose novel algorithm, namely, eigenvalue test using random matrix theory (ETRMT) needs no prior information about channel. particular, when number samples finite at receiver or devices large, sampled signal...