no code implementations • 9 Mar 2021 • Ankit Dubey, Chinmoy Kundu, Telex M. N. Ngatched, Octavia A. Dobre, Ranjan K. Mallik
By employing power allocation to minimize the outage probability, it is realized that the power should be allocated in accordance with the inter-node distances and channel parameters.
no code implementations • 9 Mar 2021 • Jinghua Zhang, Chinmoy Kundu, Emi Garcia-Palacios
The backhaul reliability of secondary and the desired outage probability of the primary also have significant impact on the system.
no code implementations • 7 Mar 2021 • Chinmoy Kundu, Sarbani Ghose, Ranjan Bose
Secrecy outage of optimal, traditional and suboptimal relay selection schemes is then evaluated.
no code implementations • 7 Mar 2021 • Chinmoy Kundu, Mark F. Flanagan
The use of multiple source nodes with wireless backhaul is considered for secrecy enhancement through source node selection in future wireless networks.
no code implementations • 7 Mar 2021 • Jinghua Zhang, Chinmoy Kundu, Octavia A. Dobre, Emi Garcia-Palacios, Nguyen-Son Vo
{We also propose an optimal selection scheme and compare performances with the sub-optimal selection schemes.}
no code implementations • 16 Feb 2021 • Burhan Wafai, Chinmoy Kundu, Ankit Dubey, Jinghua Zhang, Mark F. Flanagan
The small-cell network is operating under a spectrum sharing agreement with a primary network in a cognitive radio system.
no code implementations • 16 Feb 2021 • Shalini Tripathi, Chinmoy Kundu, Octavia A. Dobre, Ankur Bansal, Mark F. Flanagan
In this paper, we apply the long short-term memory (LSTM), an advanced recurrent neural network based machine learning (ML) technique, to the problem of transmitter selection (TS) for secrecy in an underlay small-cell cognitive radio network with unreliable backhaul connections.
no code implementations • 15 Feb 2021 • Shashi Bhushan Kotwal, Chinmoy Kundu, Sudhakar Modem, Ankit Dubey, Mark F. Flanagan
In this paper, a communication network using single carrier with cyclic prefix modulation over frequency selective channels is considered, where an access point provides connectivity to a legitimate destination through multiple transmitters with unreliable backhaul links in the presence of an eavesdropper.