You are on page 1of 3

Cover letter

Title: An artificial intelligent network model to monitor the condition of a patient


with a breast tumor based on fuzzy logic

Corresponding author: PhD. Mohammad Ali Pourmina

Role Description: Conceptualization and compilation of this research, methodology


and software programming. Faculty of Electrical Engineering, Islamic Azad
University, Research Sciences Branch, Iran. Email: Pourmina@srbiau.ac.ir.

First author: PhD. Javad Nouri Pour


Role Description: Conceptualization and compilation of this research, methodology
and software programming. Faculty of Electrical Engineering, Islamic Azad
University, Research Sciences Branch, Iran. Email: javad.nooripoor@srbiau.ac.ir.

Third Author: PhD. Mohammad Naser-Moghadasi


Role description: Scientific guidance, Data curation and text editing. Faculty of
Electrical Engineering, Islamic Azad University, Research Sciences Branch, Iran.
Email: mn. Moghaddasi @srbiau.ac.ir
.

The fourth author: PhD. Behbod Ghalamkari


Role description: Scientific guidance, Data curation and text editing. Faculty of
Electrical Engineering, Islamic Azad University, Research Sciences Branch, Iran.
Email: Ghalamkari@srbiau.ac.ir
Ethical statements
J. Nouri , M.A. Pourmina, Mohammad Naser-Moghadasi and Behbod Ghalamkari
declare that they have no conflict of interest.

4 April 2023

To whom it may concern: We hereby our manuscript in the title “An artificial intelligent network model
to monitor the condition of a patient with a breast tumor based on fuzzy logic”, for possible inclusion
in Wireless Communications and Mobile Computing. In this paper, we investigate the physical-layer
security for multiple peer-to-peer communications in a two-way relaying networks involving 2L users, a
relay, and an eavesdropper equipped with NR and NE antennas, respectively. Only a couple of peer-to-peer
users demand security to exchange messages because the eavesdropper intends to wiretap them in both
transmission phases. Our goal is to maximize the secrecy sum rate of specific peer-to-peer users, provided
that restrictive constraints are satisfied. We endorse a null space beamforming scheme at the relay to
simplify the optimization problem and exclude private information leakage. The problem is still nonlinear
and nonconvex due to coupled variables of the user transmit power with the relay beamforming matrix.
Therefore, we formulate the problem into two subproblems, one in terms of the relay beamforming matrix
and the other in terms of the user transmit power. To find a locally optimal solution for the relay
beamforming, we turn it into a difference of convex programming problem and for user power allocation,
we drive it into a constrained nonlinear optimization problem. Finally, simulations are performed to
evaluate the performance benefits of the proposed method.

We confirm that this manuscript has not been published elsewhere and is not under consideration
by another journal for publication. All authors have approved the manuscript and agree with
submission to Wireless Communications and Mobile Computing. The authors have no conflicts of
interest to declare.
Sincerely,
Mohammad Ali Pourmina, PhD

You might also like