Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Y.-W P. Hong"'
Publikováno v:
IEEE Signal Processing Magazine. 30:29-40
This article provides an overview of the signal processing techniques used to enhance secrecy in the physical layer of multiantenna wireless communication systems. Motivated by results in information theory, signal processing techniques in both the d
Publikováno v:
IEEE Transactions on Information Forensics and Security. 8:1126-1139
Multirelay networks exploit spatial diversity by transmitting user's messages through multiple relay paths. Most works in the literature on cooperative or relay networks assume that all terminals are fully cooperative and neglect the effect of possib
Publikováno v:
IEEE Transactions on Wireless Communications. 12:3458-3472
A channel-and-sensing-aware channel access (CSCA) policy is proposed for multi-channel interweave cognitive radio systems, where multiple secondary users (SUs) are competing for transmission to a common access point. The proposed CSCA policy consists
Publikováno v:
IEEE Transactions on Wireless Communications. 11:4058-4073
We consider the interference-mitigation based cognitive radio where the primary and secondary users can coexist at the same time and frequency bands, under the constraint that the rate of the primary user (PU) must remain the same with a single-user
Publikováno v:
IEEE Transactions on Vehicular Technology. 60:3228-3240
Subcarrier allocation, power allocation, and partner selection (PS) algorithms are examined for amplify-and-forward (AF) cooperative multicarrier systems. Consider a network that consists of multiple cooperative pairs that employ a two-phase cooperat
Autor:
Y.-W P. Hong, Sheng-Wei Wang
Publikováno v:
ICC
The impact of imperfect channel state information (CSI) on the transmission control of channel-aware slotted ALOHA networks is studied in this work. By taking into consideration the statistics of the channel estimation error to maximize the achievabl
Publikováno v:
ICC
This work examines the use of two-way training to efficiently discriminate the channel estimation performances at a legitimate receiver (LR) and an unauthorized receiver (UR) in a multiple-input multiple-output (MIMO) wireless system. This work impro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9ff44b44a05472b07b2a144484ab73bb
Publikováno v:
CISS
In this paper, we consider the interference-mitigation based cognitive radio (CR) model where the CR and primary users can coexist at the same time and frequency bands, under the constraint that the primary rate remains the same with the single-user