• Login
    Search 
    •   Home
    • Academic Divisions
    • Computer, Electrical and Mathematical Sciences & Engineering (CEMSE)
    • Electrical Engineering Program
    • Search
    •   Home
    • Academic Divisions
    • Computer, Electrical and Mathematical Sciences & Engineering (CEMSE)
    • Electrical Engineering Program
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Filter by Category

    AuthorAlouini, Mohamed-Slim (10)
    Rezki, Zouheir (10)
    Sboui, Lokman (3)Hyadi, Amal (2)Khisti, Ashish (2)View MoreDepartmentComputer, Electrical and Mathematical Sciences and Engineering (CEMSE) Division (10)Electrical Engineering Program (10)Physical Sciences and Engineering (PSE) Division (1)SubjectWireless (6)View MoreType
    Poster (10)
    Year (Issue Date)2017 (1)2016 (4)2015 (3)2014 (2)Item AvailabilityOpen Access (10)

    Browse

    All of KAUSTCommunitiesIssue DateSubmit DateThis CollectionIssue DateSubmit Date

    My Account

    Login

    Quick Links

    Open Access PolicyORCID LibguidePlumX LibguideSubmit an Item

    Statistics

    Display statistics
     

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Now showing items 1-10 of 10

    • List view
    • Grid view
    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Submit Date Asc
    • Submit Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    • 10CSV
    • 10RefMan
    • 10EndNote
    • 10BibTex
    • Selective Export
    • Select All
    • Help
    Thumbnail

    Secure Broadcasting with Uncertain Channel State Information

    Hyadi, Amal; Rezki, Zouheir; Khisti, Ashish; Alouini, Mohamed-Slim (2016-01-06) [Poster]
    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper s CSI and not of its channel s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.
    Thumbnail

    Device-to-Device Underlay Cellular Networks with Uncertain Channel State Information

    Memmi, Amen; Rezki, Zouheir; Alouini, Mohamed-Slim (2016-01-06) [Poster]
    Device-to-Device (D2D) communications underlying the cellular infrastructure is a technology that has recently been proposed as a promising solution to enhance cellular network capabilities: It improves spectrum utilization, overall throughput and energy efficiency while enabling new peer-to-peer and location-based applications and services. However, interference is the major challenge since the same resources are shared by both systems. Therefore, interference management techniques are required to keep the interference under control. In this work, in order to mitigate interference, we consider centralized and distributed power control algorithms in a one-cell random network model. Differently from previous works, we are assuming that the channel state information (CSI) may be imperfect and include estimation errors. We evaluate how this uncertainty impacts performances.
    Thumbnail

    Performance Analysis of Communications under Energy Harvesting Constraints with noisy CSI

    Znaidi, Mohamed Ridha; Rezki, Zouheir; Tembine, Hamidou; Alouini, Mohamed-Slim (2016-01-06) [Poster]
    In energy harvesting communications, the transmitters have to adapt transmission to availability of energy harvested during the course of communication. The performance of the transmission depends on the channel conditions which vary randomly due to environmental changes. In this work, we consider the problem of power allocation taking into account the energy arrivals over time and the degree of channel state information (CSI) available at the transmitter, to maximize the throughput. Differently from previous work, the CSI at the transmitter is not perfect and may include estimation errors. We solve this problem with respect to the Energy Harvesting constraints. We determine the optimal power in the case where the channel is assumed to be perfectly known at the receiver. Also, we obtain the power policy when the transmitter has no CSI. Furthermore, we analyze the asymptotic average throughput in a system where the average recharge rate goes asymptotically to zero and when it is very high.
    Thumbnail

    Energy Efficient Power Allocation for Cognitive MIMO Channels

    Sboui, Lokman; Rezki, Zouheir; Salem, Ahmed Sultan; Alouini, Mohamed-Slim (2016-01-06) [Poster]
    Two major issues are facing today s wireless communications evolution: -Spectrum scarcity: Need for more bandwidth. As a solution, the Cognitive Radio (CR) paradigm, where secondary users (unlicensed) share the spectrum with licensed users, was introduced. -Energy consumption and CO2 emission: The ICT produces 2% of global CO2 emission (equivalent to the aviation industry emission). The cellular networks produces 0.2%. As solution energy efficient systems should be designed rather than traditional spectral efficient systems. In this work, an energy efficient power allocation framework based on maximizing the average EE per parallel channel is presented.
    Thumbnail

    Secret-Sharing over Multiple-Antenna Channels with Transmit Correlation

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim (2015-01-07) [Poster]
    We consider secret-key agreement with public discussion over Rayleigh fastfading channels with transmit correlation. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the transmit correlation matrix. First, We derive the expression of the key capacity under the considered setup. Then, we show that the optimal transmit strategy achieving the key capacity consists in transmitting Gaussian signals along the eingenvectors of the channel covariance matrix. The powers allocated to each channel mode are determined as the solution of a numerical optimization problem that we derive. We also provide a waterfilling interpretation of the optimal power allocation. Finally, we develop a necessary and sufficient condition for beamforming to be optimal, i.e., transmitting along the strongest channel mode only is key capacity-achieving.
    Thumbnail

    Performance Limits of Energy Harvesting Communications under Imperfect Channel State Information

    Zenaidi, Mohamed Ridah; Rezki, Zouheir; Tembine, Hamidou; Alouini, Mohamed-Slim (2015-01-07) [Poster]
    In energy harvesting communications, the transmitters have to adapt transmission to availability of energy harvested during the course of communication. The performance of the transmission depends on the channel conditions which vary randomly due to mobility and environmental changes. In this work, we consider the problem of power allocation taking into account the energy arrivals over time and the degree of channel state information (CSI) available at the transmitter, in order to maximize the throughput. In this work, the CSI at the transmitter is not perfect and may include estimation errors. We solve this problem with respect to the causality and energy storage constraints. We determine the optimal offline policy in the case where the channel is assumed to be perfectly known at the receiver. Different cases of CSI availability are studied for the transmitter. We obtain the power policy when the transmitter has either perfect CSI or no CSI. We also investigate of utmost interest the case of fading channels with imperfect CSI. Furthermore, we analyze the asymptotic average throughput in a system where the average recharge rate goes asymptotically to zero and when it is very high.
    Thumbnail

    Energy-Efficient Power Allocation of Cognitive Radio Systems without CSI at the Transmitter

    Sboui, Lokman; Rezki, Zouheir; Alouini, Mohamed-Slim (2015-01-07) [Poster]
    Two major issues are facing today’s wireless communications evolution: -Spectrum scarcity: Need for more bandwidth. As a solution, the Cognitive Radio (CR) paradigm, where secondary users (unlicensed) share the spectrum with licensed users, was introduced. -Energy consumption and CO2 emission: The ICT produce 2% of global CO2 emission (equivalent to the aviation industry emission). The cellular networks produces 0.2%. As solution energy efficient systems should be designed rather than traditional spectral efficient systems. In this work, we aim to determine the optimal energy efficient power allocation of CR when the channel state information at the transmitter CSI-T is not available.
    Thumbnail

    Capacity of Some Fading Channels in the Low Power Regime with Imperfect Channel State Information

    Benkhelifa, Fatma; Rezki, Zouheir; Alouini, Mohamed-Slim (2014-01-06) [Poster]
    Thumbnail

    On Achievable Rates of Cognitive Radio Networks using Multi-layer Coding

    Sboui, Lokman; Rezki, Zouheir; Alouini, Mohamed-Slim (2014-01-06) [Poster]
    Thumbnail

    Secure Broadcasting with Uncertain Channel State Information

    Hyadi, Amal; Rezki, Zouheir; Khisti, Ashish; Alouini, Mohamed-Slim (2017-03-13) [Poster]
    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper's CSI and not of its channel's realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.
    DSpace software copyright © 2002-2019  DuraSpace
    Quick Guide | Contact Us | Send Feedback
    Open Repository is a service hosted by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items. For anonymous users the allowed maximum amount is 50 search results.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.