Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Conventional methods of codebook design in limited-feedback multi-antenna systems aim to quantize the single-user channel but without considering secrecy requirements. Thus, the information leakage is inevitably aggravated due to the eavesdropping behaviors in limited-feedback multiple-input single-output single-antenna- eavesdropper (MISOSE) systems. To reduce the information leakage without any...
Pilot spoofing attack is a serious threat to timedivision duplex (TDD) orthogonal frequency division multiplexing (TDD-OFDM) system. By employing identical pilot tones as a legitimate receiver, an adversary can contaminate the uplink channel estimation between a transceiver pair. To solve this problem, we in this paper propose an independent component analysis (ICA) based channel estimation and identification...
Secure wireless communication has always been a hot research topic due to the vulnerabilities associated with wireless channel. Physical layer aspects to secure wireless communication, based on the information-theoretic security and signal processing methods have gained much recognition over the last decade. Specifically, artificial noise (AN) methods are assumed to be good means for providing security...
Guaranteeing the secure delivery is a critical yet challenging issue in wireless transmission. In this paper, a secure delivery scheme that utilizing the dynamic fountain code design is proposed. Using fountain-coded transmission, the transmitter continuously sends fountain packets until the legitimate receiver successfully recovers the original data from a sufficient number of fountain packets. Secure...
In this paper, an efficient method is proposed to eliminate frequency splitting in nonradiative wireless power transfer via magnetic resonance coupling. In this method, two nonidentical resonant coils (NIRCs) are used as wireless power transmitter and receiver, respectively. According to the elliptic integral term in the analytical expression, the pole of the mutual inductance function with respect...
In light of the drastically-increasing demands on ubiquitous information acquisition and exchange, battery-powered devices are playing a more critical role in wireless networking, which inspires and expedites the development of energy-harvesting techniques. The sustainability requirements for such devices include two mutual-impacting dimensions: energy supply avoiding battery outage and stable transmissions...
Reactive jamming, which performs jamming attacks on condition of detecting the legitimate transmissions, is widely considered as one of the most serious security challenges in wireless communications. In this paper, we tackle the reactive jamming issue from a novel yet realistic perspective -- the jammer may not always be able to accurately detect the legitimate transmissions, which in turn, can be...
In this paper, we propose a joint amplify-and-forward (AF)-based channel estimation and user selection (J-ACES) scheme for multi-user MIMO (MU-MIMO) systems. Firstly, without channel state information (CSI) quantization, the transmitter estimates the downlink CSI for each receiver by adopting AF-based CSI feedback mechanism, in which the receiver amplifies and feeds back its own received downlink...
A novel method using resonant coils of different sizes is proposed to suppress frequency splitting in wireless power transfer (WPT). Frequency splitting is caused by excessive mutual inductance between transmitter and receiver, and can be suppressed by reasonably designing the sizes of the transmitter and receiver to eliminate the pole value of the mutual inductance. Theory calculation are conducted...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.