In this paper, the security of two-way relay communications in the presence of a passive eavesdropper is investigated. Two users communicate via a relay that depends solely on energy harvesting to ...amplify and forward the received signals. Time switching is employed at the relay to harvest energy and obtain user information. A friendly jammer is utilized to hinder the eavesdropping from wiretapping the information signal. The eavesdropper employs maximal ratio combining and selection combining to improve the signal-to-noise ratio of the wiretapped signals. Geometric programming (GP) is used to maximize the secrecy capacity of the system by jointly optimizing the time switching ratio of the relay and transmit power of the two users and jammer. The impact of imperfect channel state information at the eavesdropper for the links between the eavesdropper and the other nodes is determined. Further, the secrecy capacity when the jamming signal is not perfectly cancelled at the relay is examined. The secrecy capacity is shown to be greater with a jammer compared to the case without a jammer. The effect of the relay, jammer, and eavesdropper locations on the secrecy capacity is also studied. It is shown that the secrecy capacity is greatest when the relay is at the midpoint between the users. The closer the jammer is to the eavesdropper, the higher the secrecy capacity as the shorter distance decreases the signal-to-noise ratio of the jammer.
This paper considers the transceiver design in a multiuser multiple-input multiple-output (MIMO) full-duplex (FD) amplify-and-forward (AF) relay downlink communication system, where users ...simultaneously transmit data via an FD relay node. The design incorporates an imperfect loop interference (LI) cancellation which results in a residual LI. Linear precoders are employed at the sources and relay, and minimum mean-squared-error (MMSE) combiners are employed at the destinations to mitigate the effect of the residual LI. The corresponding design problem is highly nonconvex, so a closed-form solution is intractable. Thus, an iterative method is developed to solve this optimization problem. Simulation results are presented which show that the proposed iterative algorithm provides better performance than the corresponding half-duplex (HD) solution in terms of the achievable rate under residual LI.
Unmanned aerial vehicles (UAVs) are now readily available worldwide and users can easily fly them remotely using smart controllers. This has created the problem of keeping unauthorized UAVs away from ...private or sensitive areas where they can be a personal or public threat. This paper proposes an improved radio frequency (RF)-based method to detect UAVs. The clutter (interference) is eliminated using a background filtering method. Then singular value decomposition (SVD) and average filtering are used to reduce the noise and improve the signal to noise ratio (SNR). Spectrum accumulation (SA) and statistical fingerprint analysis (SFA) are employed to provide two frequency estimates. These estimates are used to determine if a UAV is present in the detection environment. The data size is reduced using a region of interest (ROI), and this improves the system efficiency and improves azimuth estimation accuracy. Detection results are obtained using real UAV RF signals obtained experimentally which show that the proposed method is more effective than other well-known detection algorithms. The recognition rate with this method is close to 100% within a distance of 2.4 km and greater than 90% within a distance of 3 km. Further, multiple UAVs can be detected accurately using the proposed method.
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme ...based on the Niederreiter cryptosystem. However, it is not widely used due to the computation time of the signing algorithm. Most code‐based digital signature schemes are based on the Niederreiter cryptosystem. This paper proposes a new code‐based digital signature that is based on the McEliece cryptosystem. Key generation, signing, and verification algorithms are presented. The key generation algorithm constructs a public key using random inverse matrices. The signing algorithm has lower complexity and requires less computation time than the CFS scheme to sign a document. The verification algorithm is able to detect forgeries. It is shown that the proposed scheme is secure against public key structural attacks.
A new code‐based digital signature based on McEliece cryptosystems is proposed. To the authors knowledge, the proposed scheme is the first code‐based digital signature based on McEliece with the lower processing time required to construct a valid digital signature.
This paper analyzes and discusses the capability of human being detection using impulse ultra-wideband (UWB) radar with an improved detection algorithm. The multiple automatic gain control (AGC) ...technique is employed to enhance the amplitudes of human respiratory signals. Two filters with seven values averaged are used to further improve the signal-to-noise ratio (SNR) of the human respiratory signals. The maximum slope and standard deviation are used for analyzing the characteristics of the received pulses, which can provide two distance estimates for human being detection. Most importantly, based on the two distance estimates, we can accurately judge whether there are human beings in the detection environments or not. The data size can be reduced based on the defined interested region, which can improve the operation efficiency of the radar system for human being detection. The developed algorithm provides excellent performance regarding human being detection, which is validated through comparison with several well-known algorithms.
Traffic flow analysis is essential to develop smart urban mobility solutions. Although numerous tools have been proposed, they employ only a small number of parameters. To overcome this limitation, ...an edge computing solution is proposed based on nine traffic parameters, namely, vehicle count, direction, speed, and type, flow, peak hour factor, density, time headway, and distance headway. The proposed low-cost solution is easy to deploy and maintain. The sensor node is comprised of a Raspberry Pi 4, Pi camera, Intel Movidius Neural Compute Stick 2, Xiaomi MI Power Bank, and Zong 4G Bolt+. Pre-trained models from the OpenVINO Toolkit are employed for vehicle detection and classification, and a centroid tracking algorithm is used to estimate vehicle speed. The measured traffic parameters are transmitted to the ThingSpeak cloud platform via 4G. The proposed solution was field-tested for one week (7 h/day), with approximately 10,000 vehicles per day. The count, classification, and speed accuracies obtained were 79.8%, 93.2%, and 82.9%, respectively. The sensor node can operate for approximately 8 h with a 10,000 mAh power bank and the required data bandwidth is 1.5 MB/h. The proposed edge computing solution overcomes the limitations of existing traffic monitoring systems and can work in hostile environments.
Recent growth in traffic and the resulting congestion and accidents has increased the demand for vehicle positioning systems. Existing global navigation satellite systems were designed for line of ...sight environments and thus accurately determining the location of a vehicle in urban areas with tall buildings or regions with dense foliage is difficult. Fifth generation (5G) cellular networks provide device-to-device communication capabilities which can be exploited to determine the real-time location of vehicles. Millimeter-wave (mmWave) transmission is regarded as a key technology for 5G networks. This paper examines vehicle positioning using 5G mmWave signals. Both a correlation receiver and an energy detector are considered for timing estimation. Furthermore, fixed and dynamic thresholds for energy detection are examined. It is shown that a correlation receiver can provide excellent ranging accuracy but has high computational complexity, whereas an energy detector has low computational complexity and provides good ranging accuracy. Furthermore, the Gaussian raised-cosine pulse (RCP), Gaussian pulse, and Sinc-RCP impulse radio waveforms provide the best performance.
•Review of notable quantum simulation methods used in simulating QFThs and other related sciences.•Review model strengths and limitations by its common measurement parameters in predicting ...states.•Propose a universal QFCM to make strong predictions of system states via QAI methods.
Quantum field theory (QFTh) simulators simulate physical systems using quantum circuits that process quantum information (qubits) via single field (SF) and/or quantum double field (QDF) transformation. This review presents models that classify states against pairwise particle states |ij〉, given their state transition (ST) probability P|ij〉. A quantum AI (QAI) program, weighs and compares the field’s distance between entangled states as qubits from their scalar field of radius R≥|rij|. These states distribute across 〈R〉 with expected probability 〈Pdistribute〉 and measurement outcome 〈M(Pdistribute)〉=P|ij〉. A quantum-classical hybrid model of processors via QAI, classifies and predicts states by decoding qubits into classical bits. For example, a QDF as a quantum field computation model (QFCM) in IBM-QE, performs the doubling of P|ij〉 for a strong state prediction outcome. QFCMs are compared to achieve a universal QFCM (UQFCM). This model is novel in making strong event predictions by simulating systems on any scale using QAI. Its expected measurement fidelity is 〈M(F)〉≥7/5 in classifying states to select 7 optimal QFCMs to predict 〈M〉’s on QFTh observables. This includes QFCMs’ commonality of 〈M〉 against QFCMs limitations in predicting system events. Common measurement results of QFCMs include their expected success probability 〈Psuccess〉 over STs occurring in the system. Consistent results with high F’s, are averaged over STs as 〈Pdistribute〉yielding 〈Psuccess〉≥2/3 performed by an SF or QDF of certain QFCMs. A combination of QFCMs with this fidelity level predicts error rates (uncertainties) in measurements, by which a P|ij〉=〈Psuccess〉<∼1 is weighed as a QAI output to a QFCM user. The user then decides which QFCMs perform a more efficient system simulation as a reliable solution. A UQFCM is useful in predicting system states by preserving and recovering information for intelligent decision support systems in applied, physical, legal and decision sciences, including industry 4.0 systems.
Display omitted
Increasing building energy consumption has led to environmental and economic issues. Energy demand prediction (DP) aims to reduce energy use. Machine learning (ML) methods have been used to improve ...building energy consumption, but not all have performed well in terms of accuracy and efficiency. In this paper, these methods are examined and evaluated for modern building (MB) DP.
This paper considers vital signs (VS) such as respiration movement detection of human subjects using an impulse ultra-wideband (UWB) through-wall radar with an improved sensing algorithm for ...random-noise de-noising and clutter elimination. One filter is used to improve the signal-to-noise ratio (SNR) of these VS signals. Using the wavelet packet decomposition, the standard deviation based spectral kurtosis is employed to analyze the signal characteristics to provide the distance estimate between the radar and human subject. The data size is reduced based on a defined region of interest (ROI), and this improves the system efficiency. The respiration frequency is estimated using a multiple time window selection algorithm. Experimental results are presented which illustrate the efficacy and reliability of this method. The proposed method is shown to provide better VS estimation than existing techniques in the literature.