-
How Strong a Kick Should be to Topple Northeastern's Tumbling Robot?
Authors:
Adarsh Salagame,
Neha Bhattachan,
Andre Caetano,
Ian McCarthy,
Henry Noyes,
Brandon Petersen,
Alexander Qiu,
Matthew Schroeter,
Nolan Smithwick,
Konrad Sroka,
Jason Widjaja,
Yash Bohra,
Kaushik Venkatesh,
Kruthika Gangaraju,
Paul Ghanem,
Ioannis Mandralis,
Eric Sihite,
Arash Kalantari,
Alireza Ramezani
Abstract:
Rough terrain locomotion has remained one of the most challenging mobility questions. In 2022, NASA's Innovative Advanced Concepts (NIAC) Program invited US academic institutions to participate NASA's Breakthrough, Innovative \& Game-changing (BIG) Idea competition by proposing novel mobility systems that can negotiate extremely rough terrain, lunar bumpy craters. In this competition, Northeastern…
▽ More
Rough terrain locomotion has remained one of the most challenging mobility questions. In 2022, NASA's Innovative Advanced Concepts (NIAC) Program invited US academic institutions to participate NASA's Breakthrough, Innovative \& Game-changing (BIG) Idea competition by proposing novel mobility systems that can negotiate extremely rough terrain, lunar bumpy craters. In this competition, Northeastern University won NASA's top Artemis Award award by proposing an articulated robot tumbler called COBRA (Crater Observing Bio-inspired Rolling Articulator). This report briefly explains the underlying principles that made COBRA successful in competing with other concepts ranging from cable-driven to multi-legged designs from six other participating US institutions.
△ Less
Submitted 24 November, 2023;
originally announced November 2023.
-
Demonstrating Autonomous 3D Path Planning on a Novel Scalable UGV-UAV Morphing Robot
Authors:
Eric Sihite,
Filip Slezak,
Ioannis Mandralis,
Adarsh Salagame,
Milad Ramezani,
Arash Kalantari,
Alireza Ramezani,
Morteza Gharib
Abstract:
Some animals exhibit multi-modal locomotion capability to traverse a wide range of terrains and environments, such as amphibians that can swim and walk or birds that can fly and walk. This capability is extremely beneficial for expanding the animal's habitat range and they can choose the most energy efficient mode of locomotion in a given environment. The robotic biomimicry of this multi-modal loc…
▽ More
Some animals exhibit multi-modal locomotion capability to traverse a wide range of terrains and environments, such as amphibians that can swim and walk or birds that can fly and walk. This capability is extremely beneficial for expanding the animal's habitat range and they can choose the most energy efficient mode of locomotion in a given environment. The robotic biomimicry of this multi-modal locomotion capability can be very challenging but offer the same advantages. However, the expanded range of locomotion also increases the complexity of performing localization and path planning. In this work, we present our morphing multi-modal robot, which is capable of ground and aerial locomotion, and the implementation of readily available SLAM and path planning solutions to navigate a complex indoor environment.
△ Less
Submitted 31 July, 2023;
originally announced August 2023.
-
Cross or Wait? Predicting Pedestrian Interaction Outcomes at Unsignalized Crossings
Authors:
Chi Zhang,
Amir Hossein Kalantari,
Yue Yang,
Zhongjun Ni,
Gustav Markkula,
Natasha Merat,
Christian Berger
Abstract:
Predicting pedestrian behavior when interacting with vehicles is one of the most critical challenges in the field of automated driving. Pedestrian crossing behavior is influenced by various interaction factors, including time to arrival, pedestrian waiting time, the presence of zebra crossing, and the properties and personality traits of both pedestrians and drivers. However, these factors have no…
▽ More
Predicting pedestrian behavior when interacting with vehicles is one of the most critical challenges in the field of automated driving. Pedestrian crossing behavior is influenced by various interaction factors, including time to arrival, pedestrian waiting time, the presence of zebra crossing, and the properties and personality traits of both pedestrians and drivers. However, these factors have not been fully explored for use in predicting interaction outcomes. In this paper, we use machine learning to predict pedestrian crossing behavior including pedestrian crossing decision, crossing initiation time (CIT), and crossing duration (CD) when interacting with vehicles at unsignalized crossings. Distributed simulator data are utilized for predicting and analyzing the interaction factors. Compared with the logistic regression baseline model, our proposed neural network model improves the prediction accuracy and F1 score by 4.46% and 3.23%, respectively. Our model also reduces the root mean squared error (RMSE) for CIT and CD by 21.56% and 30.14% compared with the linear regression model. Additionally, we have analyzed the importance of interaction factors, and present the results of models using fewer factors. This provides information for model selection in different scenarios with limited input features.
△ Less
Submitted 19 March, 2024; v1 submitted 17 April, 2023;
originally announced April 2023.
-
Improving Sample Efficiency of Value Based Models Using Attention and Vision Transformers
Authors:
Amir Ardalan Kalantari,
Mohammad Amini,
Sarath Chandar,
Doina Precup
Abstract:
Much of recent Deep Reinforcement Learning success is owed to the neural architecture's potential to learn and use effective internal representations of the world. While many current algorithms access a simulator to train with a large amount of data, in realistic settings, including while playing games that may be played against people, collecting experience can be quite costly. In this paper, we…
▽ More
Much of recent Deep Reinforcement Learning success is owed to the neural architecture's potential to learn and use effective internal representations of the world. While many current algorithms access a simulator to train with a large amount of data, in realistic settings, including while playing games that may be played against people, collecting experience can be quite costly. In this paper, we introduce a deep reinforcement learning architecture whose purpose is to increase sample efficiency without sacrificing performance. We design this architecture by incorporating advances achieved in recent years in the field of Natural Language Processing and Computer Vision. Specifically, we propose a visually attentive model that uses transformers to learn a self-attention mechanism on the feature maps of the state representation, while simultaneously optimizing return. We demonstrate empirically that this architecture improves sample complexity for several Atari environments, while also achieving better performance in some of the games.
△ Less
Submitted 1 February, 2022;
originally announced February 2022.
-
NeBula: Quest for Robotic Autonomy in Challenging Environments; TEAM CoSTAR at the DARPA Subterranean Challenge
Authors:
Ali Agha,
Kyohei Otsu,
Benjamin Morrell,
David D. Fan,
Rohan Thakker,
Angel Santamaria-Navarro,
Sung-Kyun Kim,
Amanda Bouman,
Xianmei Lei,
Jeffrey Edlund,
Muhammad Fadhil Ginting,
Kamak Ebadi,
Matthew Anderson,
Torkom Pailevanian,
Edward Terry,
Michael Wolf,
Andrea Tagliabue,
Tiago Stegun Vaquero,
Matteo Palieri,
Scott Tepsuporn,
Yun Chang,
Arash Kalantari,
Fernando Chavez,
Brett Lopez,
Nobuhiro Funabiki
, et al. (47 additional authors not shown)
Abstract:
This paper presents and discusses algorithms, hardware, and software architecture developed by the TEAM CoSTAR (Collaborative SubTerranean Autonomous Robots), competing in the DARPA Subterranean Challenge. Specifically, it presents the techniques utilized within the Tunnel (2019) and Urban (2020) competitions, where CoSTAR achieved 2nd and 1st place, respectively. We also discuss CoSTAR's demonstr…
▽ More
This paper presents and discusses algorithms, hardware, and software architecture developed by the TEAM CoSTAR (Collaborative SubTerranean Autonomous Robots), competing in the DARPA Subterranean Challenge. Specifically, it presents the techniques utilized within the Tunnel (2019) and Urban (2020) competitions, where CoSTAR achieved 2nd and 1st place, respectively. We also discuss CoSTAR's demonstrations in Martian-analog surface and subsurface (lava tubes) exploration. The paper introduces our autonomy solution, referred to as NeBula (Networked Belief-aware Perceptual Autonomy). NeBula is an uncertainty-aware framework that aims at enabling resilient and modular autonomy solutions by performing reasoning and decision making in the belief space (space of probability distributions over the robot and world states). We discuss various components of the NeBula framework, including: (i) geometric and semantic environment map**; (ii) a multi-modal positioning system; (iii) traversability analysis and local planning; (iv) global motion planning and exploration behavior; (i) risk-aware mission planning; (vi) networking and decentralized reasoning; and (vii) learning-enabled adaptation. We discuss the performance of NeBula on several robot types (e.g. wheeled, legged, flying), in various environments. We discuss the specific results and lessons learned from fielding this solution in the challenging courses of the DARPA Subterranean Challenge competition.
△ Less
Submitted 18 October, 2021; v1 submitted 21 March, 2021;
originally announced March 2021.
-
The Shapeshifter: a Morphing, Multi-Agent,Multi-Modal Robotic Platform for the Exploration of Titan (preprint version)
Authors:
Ali-akbar Agha-mohammadi,
Andrea Tagliabue,
Stephanie Schneider,
Benjamin Morrell,
Marco Pavone,
Jason Hofgartner,
Issa A. D. Nesnas,
Rashied B. Amini,
Arash Kalantari,
Alessandra Babuscia,
Jonathan Lunine
Abstract:
In this report for the Nasa NIAC Phase I study, we present a mission architecture and a robotic platform, the Shapeshifter, that allow multi-domain and redundant mobility on Saturn's moon Titan, and potentially other bodies with atmospheres. The Shapeshifter is a collection of simple and affordable robotic units, called Cobots, comparable to personal palm-size quadcopters. By attaching and detachi…
▽ More
In this report for the Nasa NIAC Phase I study, we present a mission architecture and a robotic platform, the Shapeshifter, that allow multi-domain and redundant mobility on Saturn's moon Titan, and potentially other bodies with atmospheres. The Shapeshifter is a collection of simple and affordable robotic units, called Cobots, comparable to personal palm-size quadcopters. By attaching and detaching with each other, multiple Cobots can shape-shift into novel structures, capable of (a) rolling on the surface, to increase the traverse range, (b) flying in a flight array formation, and (c) swimming on or under liquid. A ground station complements the robotic platform, hosting science instrumentation and providing power to recharge the batteries of the Cobots. Our Phase I study had the objective of providing an initial assessment of the feasibility of the proposed robotic platform architecture, and in particular (a) to characterize the expected science return of a mission to the Sotra-Patera region on Titan; (b) to verify the mechanical and algorithmic feasibility of building a multi-agent platform capable of flying, docking, rolling and un-docking; (c) to evaluate the increased range and efficiency of rolling on Titan w.r.t to flying; (d) to define a case-study of a mission for the exploration of the cryovolcano Sotra-Patera on Titan, whose expected variety of geological features challenges conventional mobility platforms.
△ Less
Submitted 16 March, 2020;
originally announced March 2020.
-
Low Complexity Symbol-Level Design for Linear Precoding Systems
Authors:
Jevgenij Krivochiza,
Ashkan Kalantari,
Symeon Chatzinotas,
Bjorn Ottersten
Abstract:
The practical utilization of the symbol-level precoding in MIMO systems is challenging since the implementation of the sophisticated optimization algorithms must be done with reasonable computational resources. In the real implementation of MIMO precoding systems, the processing time for each set of symbols is a crucial parameter, especially in the high-throughput mode. In this work, a symbol-leve…
▽ More
The practical utilization of the symbol-level precoding in MIMO systems is challenging since the implementation of the sophisticated optimization algorithms must be done with reasonable computational resources. In the real implementation of MIMO precoding systems, the processing time for each set of symbols is a crucial parameter, especially in the high-throughput mode. In this work, a symbol-level optimization algorithm with reduced complexity is devised. Performance of a symbol-level precoder is shown to improve in terms of the processing times per set of symbols.
△ Less
Submitted 27 October, 2017;
originally announced November 2017.
-
Symbol-level and Multicast Precoding for Multiuser Multiantenna Downlink: A Survey, Classification and Challenges
Authors:
Maha Alodeh,
Danilo Spano,
Ashkan Kalantari,
Christos Tsinos,
Dimitrios Christopoulos,
Symeon Chatzinotas,
Björn Ottersten
Abstract:
Precoding has been conventionally considered as an effective means of mitigating the interference and efficiently exploiting the available in the multiantenna downlink channel, where multiple users are simultaneously served with independent information over the same channel resources. The early works in this area were focused on transmitting an individual information stream to each user by constru…
▽ More
Precoding has been conventionally considered as an effective means of mitigating the interference and efficiently exploiting the available in the multiantenna downlink channel, where multiple users are simultaneously served with independent information over the same channel resources. The early works in this area were focused on transmitting an individual information stream to each user by constructing weighted linear combinations of symbol blocks (codewords). However, more recent works have moved beyond this traditional view by: i) transmitting distinct data streams to groups of users and ii) applying precoding on a symbol-per-symbol basis. In this context, the current survey presents a unified view and classification of precoding techniques with respect to two main axes: i) the switching rate of the precoding weights, leading to the classes of block- and symbol-level precoding, ii) the number of users that each stream is addressed to, hence unicast-/multicast-/broadcast- precoding. Furthermore, the classified techniques are compared through representative numerical results to demonstrate their relative performance and uncover fundamental insights. Finally, a list of open theoretical problems and practical challenges are presented to inspire further research in this area.
△ Less
Submitted 10 March, 2017;
originally announced March 2017.
-
Robust Cooperative Relay Beamforming
Authors:
Behrad Mahboobi,
Mehrdad Ardebilipour,
Ashkan Kalantari,
Ehsan Soleimani-Nasab
Abstract:
In this paper, the robust distributed relay beamforming problem is solved using the worst case approach, where the problem solution has been involved because of the effect of uncertainty of channel knowledge on the quality of service (QoS) constraints. It is shown that the original robust design, which is a non-convex semi-infinite problem (SIP), can be relaxed and reformed to a semi-definite prob…
▽ More
In this paper, the robust distributed relay beamforming problem is solved using the worst case approach, where the problem solution has been involved because of the effect of uncertainty of channel knowledge on the quality of service (QoS) constraints. It is shown that the original robust design, which is a non-convex semi-infinite problem (SIP), can be relaxed and reformed to a semi-definite problem (SDP). Monte-Carlo simulations are presented to verify the performance improvement of our proposed robust problem over existing robust and non-robust problems in terms of transmit power and symbol error probability.
△ Less
Submitted 6 March, 2017;
originally announced March 2017.
-
$M$-QAM Precoder Design for MIMO Directional Modulation Transceivers
Authors:
Ashkan Kalantari,
Christos Tsinos,
Mojtaba Soltanalian,
Symeon Chatzinotas,
Wing-Kin Ma,
Erik G. Larsson,
Björn Ottersten
Abstract:
Spectrally efficient multi-antenna wireless communication systems are a key challenge as service demands continue to increase. At the same time, powering up radio access networks is facing environmental and regulation limitations. In order to achieve more power efficiency, we design a directional modulation precoder by considering an $M$-QAM constellation, particularly with $M=4,8,16,32$. First, e…
▽ More
Spectrally efficient multi-antenna wireless communication systems are a key challenge as service demands continue to increase. At the same time, powering up radio access networks is facing environmental and regulation limitations. In order to achieve more power efficiency, we design a directional modulation precoder by considering an $M$-QAM constellation, particularly with $M=4,8,16,32$. First, extended detection regions are defined for desired constellations using analytical geometry. Then, constellation points are placed in the optimal positions of these regions while the minimum Euclidean distance to adjacent constellation points and detection region boundaries is kept as in the conventional $M$-QAM modulation. For further power efficiency and symbol error rate similar to that of fixed design in high SNR, relaxed detection regions are modeled for inner points of $M=16,32$ constellations. The modeled extended and relaxed detection regions as well as the modulation characteristics are utilized to formulate symbol-level precoder design problems for directional modulation to minimize the transmission power while preserving the minimum required SNR at the destination. In addition, the extended and relaxed detection regions are used for precoder design to minimize the output of each power amplifier. We transform the design problems into convex ones and devise an interior point path-following iterative algorithm to solve the mentioned problems and provide details on finding the initial values of the parameters and the starting point. Results show that compared to the benchmark schemes, the proposed method performs better in terms of power and peak power reduction as well as symbol error rate reduction for a wide range of SNRs.
△ Less
Submitted 24 November, 2018; v1 submitted 22 February, 2017;
originally announced February 2017.
-
Frequency of Arrival-based Interference Localization Using a Single Satellite
Authors:
Ashkan Kalantari,
Sina Maleki,
Symeon Chatzinotas,
Björn Ottersten
Abstract:
Intentional and unintentional interferences are an increasing threat for the satellite communications industry. In this paper, we aim to localize an interference with unknown location using frequency of arrival (FoA) technique by only relying on the measurements obtained through a single satellite. In each time instance, the satellite samples the interference and forwards it to the gateway to esti…
▽ More
Intentional and unintentional interferences are an increasing threat for the satellite communications industry. In this paper, we aim to localize an interference with unknown location using frequency of arrival (FoA) technique by only relying on the measurements obtained through a single satellite. In each time instance, the satellite samples the interference and forwards it to the gateway to estimate its frequency. Since the satellite moves, each estimated frequency includes a Doppler shift, which is related to the location of the unknown interferer. The satellite's position, velocity, oscillator frequency, and the interference frequency are used at the gateway to build a location-related equation between the estimated frequency and the location of the unknown interference. Simultaneously with the interference signal, the satellite samples a reference signal to calibrate the estimated frequency and compensate for the mismatches between the available and real values of the satellite's position, velocity, and oscillator frequency. Multiple location-related equations obtained based on the FoA measurements, (at least two), along with the equation of the earth surface are used to localize the unknown interference. Simulations show that increasing the number of these equations, and the satellite velocity can improve the localization accuracy by 80% and 95%, respectively.
△ Less
Submitted 1 August, 2016;
originally announced August 2016.
-
Directional Modulation via Symbol-Level Precoding: A Way to Enhance Security
Authors:
Ashkan Kalantari,
Mojtaba Soltanalian,
Sina Maleki,
Symeon Chatzinotas,
Björn Ottersten
Abstract:
Wireless communication provides a wide coverage at the cost of exposing information to unintended users. As an information-theoretic paradigm, secrecy rate derives bounds for secure transmission when the channel to the eavesdropper is known. However, such bounds are shown to be restrictive in practice and may require exploitation of specialized coding schemes. In this paper, we employ the concept…
▽ More
Wireless communication provides a wide coverage at the cost of exposing information to unintended users. As an information-theoretic paradigm, secrecy rate derives bounds for secure transmission when the channel to the eavesdropper is known. However, such bounds are shown to be restrictive in practice and may require exploitation of specialized coding schemes. In this paper, we employ the concept of directional modulation and follow a signal processing approach to enhance the security of multi-user MIMO communication systems when a multi-antenna eavesdropper is present. Enhancing the security is accomplished by increasing the symbol error rate at the eavesdropper. Unlike the information-theoretic secrecy rate paradigm, we assume that the legitimate transmitter is not aware of its channel to the eavesdropper, which is a more realistic assumption. We examine the applicability of MIMO receiving algorithms at the eavesdropper. Using the channel knowledge and the intended symbols for the users, we design security enhancing symbol-level precoders for different transmitter and eavesdropper antenna configurations. We transform each design problem to a linearly constrained quadratic program and propose two solutions, namely the iterative algorithm and one based on non-negative least squares, at each scenario for a computationally-efficient modulation. Simulation results verify the analysis and show that the designed precoders outperform the benchmark scheme in terms of both power efficiency and security enhancement.
△ Less
Submitted 1 August, 2016; v1 submitted 14 June, 2016;
originally announced June 2016.
-
Secure M-PSK Communication via Directional Modulation
Authors:
Ashkan Kalantari,
Mojtaba Soltanalian,
Sina Maleki,
Symeon Chatzinotas,
Björn Ottersten
Abstract:
In this work, a directional modulation-based technique is devised to enhance the security of a multi-antenna wireless communication system employing M-PSK modulation to convey information. The directional modulation method operates by steering the array beam in such a way that the phase of the received signal at the receiver matches that of the intended M-PSK symbol. Due to the difference between…
▽ More
In this work, a directional modulation-based technique is devised to enhance the security of a multi-antenna wireless communication system employing M-PSK modulation to convey information. The directional modulation method operates by steering the array beam in such a way that the phase of the received signal at the receiver matches that of the intended M-PSK symbol. Due to the difference between the channels of the legitimate receiver and the eavesdropper, the signals received by the eavesdropper generally encompass a phase component different than the actual symbols. As a result, the transceiver which employs directional modulation can impose a high symbol error rate on the eavesdropper without requiring to know the eavesdropper's channel. The optimal directional modulation beamformer is designed to minimize the consumed power subject to satisfying a specific resulting phase and minimal signal amplitude at each antenna of the legitimate receiver. The simulation results show that the directional modulation results in a much higher symbol error rate at the eavesdropper compared to the conventional benchmark scheme, i.e., zero-forcing precoding at the transmitter.
△ Less
Submitted 14 April, 2016; v1 submitted 10 April, 2016;
originally announced April 2016.
-
Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications
Authors:
Ashkan Kalantari,
Gan Zheng,
Zhen Gao,
Zhu Han,
Björn Ottersten
Abstract:
Network coding is an efficient means to improve the spectrum efficiency of satellite communications. However, its resilience to eavesdrop** attacks is not well understood. This paper studies the confidentiality issue in a bidirectional satellite network consisting of two mobile users who want to exchange message via a multibeam satellite using the XOR network coding protocol. We aim to maximize…
▽ More
Network coding is an efficient means to improve the spectrum efficiency of satellite communications. However, its resilience to eavesdrop** attacks is not well understood. This paper studies the confidentiality issue in a bidirectional satellite network consisting of two mobile users who want to exchange message via a multibeam satellite using the XOR network coding protocol. We aim to maximize the sum secrecy rate by designing the optimal beamforming vector along with optimizing the return and forward link time allocation. The problem is non-convex, and we find its optimal solution using semidefinite programming together with a 1-D search. For comparison, we also solve the sum secrecy rate maximization problem for a conventional reference scheme without using network coding. Simulation results using realistic system parameters demonstrate that the bidirectional scheme using network coding provides considerably higher secrecy rate compared to that of the conventional scheme.
△ Less
Submitted 24 April, 2016; v1 submitted 7 May, 2015;
originally announced May 2015.
-
Performance Analysis of Opportunistic Relaying Over Imperfect Non-identical Log-normal Fading Channels
Authors:
Ashkan Kalantari,
Mohammadali Mohammadi,
Mehrdad Ardebilipour
Abstract:
Motivated by the fact that full diversity order is achieved using the "best-relay" selection technique, we consider opportunistic amplify-and-forward and decode-and-forward relaying systems. We focus on the outage probability of such a systems and then derive closed-form expressions for the outage probability of these systems over independent but non-identical imperfect Log-normal fading channels.…
▽ More
Motivated by the fact that full diversity order is achieved using the "best-relay" selection technique, we consider opportunistic amplify-and-forward and decode-and-forward relaying systems. We focus on the outage probability of such a systems and then derive closed-form expressions for the outage probability of these systems over independent but non-identical imperfect Log-normal fading channels. We consider the error of channel estimation as a Gaussian random variable. As a result the estimated channels distribution are not Log-normal either as would be in the case of the Rayleigh fading channels. This is exactly the reason why our simulation results do not exactly matched with analytical results. However, this difference is negligible for a wide variety of situations.
△ Less
Submitted 6 May, 2015;
originally announced May 2015.
-
Secrecy Energy Efficiency Optimization for MISO and SISO Communication Networks
Authors:
Ashkan Kalantari,
Sina Maleki,
Symeon Chatzinotas,
Björn Ottersten
Abstract:
Energy-efficiency, high data rates and secure communications are essential requirements of the future wireless networks. In this paper, optimizing the secrecy energy efficiency is considered. The optimal beamformer is designed for a MISO system with and without considering the minimum required secrecy rate. Further, the optimal power control in a SISO system is carried out using an efficient itera…
▽ More
Energy-efficiency, high data rates and secure communications are essential requirements of the future wireless networks. In this paper, optimizing the secrecy energy efficiency is considered. The optimal beamformer is designed for a MISO system with and without considering the minimum required secrecy rate. Further, the optimal power control in a SISO system is carried out using an efficient iterative method, and this is followed by analyzing the trade-off between the secrecy energy efficiency and the secrecy rate for both MISO and SISO systems.
△ Less
Submitted 6 May, 2015;
originally announced May 2015.
-
Joint Power Control in Wiretap Interference Channels
Authors:
Ashkan Kalantari,
Sina Maleki,
Gan Zheng,
Symeon Chatzinotas,
Björn Ottersten
Abstract:
Interference in wireless networks degrades the signal quality at the terminals. However, it can potentially enhance the secrecy rate. This paper investigates the secrecy rate in a two-user interference network where one of the users, namely user 1, requires to establish a confidential connection. User 1 wants to prevent an unintended user of the network to decode its transmission. User 1 has to tr…
▽ More
Interference in wireless networks degrades the signal quality at the terminals. However, it can potentially enhance the secrecy rate. This paper investigates the secrecy rate in a two-user interference network where one of the users, namely user 1, requires to establish a confidential connection. User 1 wants to prevent an unintended user of the network to decode its transmission. User 1 has to transmit such that its secrecy rate is maximized while the quality of service at the destination of the other user, user 2, is satisfied, and both user's power limits are taken into account. We consider two scenarios: 1) user 2 changes its power in favor of user 1, an altruistic scenario, 2) user 2 is selfish and only aims to maintain the minimum quality of service at its destination, an egoistic scenario. It is shown that there is a threshold for user 2's transmission power that only below or above which, depending on the channel qualities, user 1 can achieve a positive secrecy rate. Closed-form solutions are obtained in order to perform joint optimal power control. Further, a new metric called secrecy energy efficiency is introduced. We show that in general, the secrecy energy efficiency of user 1 in an interference channel scenario is higher than that of an interference-free channel.
△ Less
Submitted 24 April, 2016; v1 submitted 9 March, 2014;
originally announced March 2014.
-
Performance Analysis of Multi-Antenna Relay Networks over Nakagami-m Fading Channel
Authors:
E. Soleimani-Nasab,
A. Kalantari,
M. Ardebilipour
Abstract:
In this chapter, the authors present the performance of multi-antenna selective combining decode-and-forward (SC-DF) relay networks over independent and identically distributed (i.i.d) Nakagami-m fading channels. The outage probability, moment generation function, symbol error probability and average channel capacity are derived in closed-form using the Signal-to-Noise-Ratio (SNR) statistical char…
▽ More
In this chapter, the authors present the performance of multi-antenna selective combining decode-and-forward (SC-DF) relay networks over independent and identically distributed (i.i.d) Nakagami-m fading channels. The outage probability, moment generation function, symbol error probability and average channel capacity are derived in closed-form using the Signal-to-Noise-Ratio (SNR) statistical characteristics. After that, the authors formulate the outage probability problem, optimize it with an approximated problem, and then solve it analytically. Finally, for comparison with analytical formulas, the authors perform some Monte-Carlo simulations.
△ Less
Submitted 29 July, 2014; v1 submitted 4 March, 2014;
originally announced March 2014.