Professional Documents
Culture Documents
Number: 21300801
Date: 13/03/2024
The Research Topic: Beamforming and Antenna Grouping Design for the Multi-Antenna
Relay with Energy Harvesting to Improve Secrecy Rate
Project Background
Background and Justification:
The project aims to optimize relay systems in wireless networks to address the key challenges
such as signal propagation, energy efficiency, and signal security. The importance of this
approach is the growing reliance on wireless communication across all technological industry
and business platforms, not forgetting communication between individuals like you and I.
This research project is to address three (3) key challenges/ limitations identified in the reviewed
literature “Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy
Harvesting to Improve Secrecy Rate” by Weijia Lei and Meihui Zhan pertaining to relay systems
and wireless network security. Specifically, we aim to improve upon the following aspects (that
lead to eavesdropping and lack of secrecy rate):
User 1
Signal Processor Tx
Power OUT1
D1 Artificial Noise
Supply (
User s Precoding Rx
) Tx Signals
Data Single User 2
IN D2 OUT2
User Data
Selection ( Relay
Process
s
System
) Tx Rx
OUTM
Beam
D3
( User M
Project Objectives
The primary objective of this research is to investigate and optimize the relay systems in
wireless networks to enhance communication security, efficiency, and reliability. Through
theoretical analysis and simulation experiments, we aim to achieve these outcomes:
1) Develop innovative techniques for optimized relay system design and beamforming
propagation modes.
2) Investigate energy-efficient protocols and mechanisms for the relay system
3) Evaluate the vulnerabilities of relay systems and security threats including; eavesdropping,
interception and jamming.
4) Provide practical implementation guidelines and best practices for deployment and
management of proposed relay system design.
5) Publish research findings in reviewed journals with project supervisors to contribute to the
academic literature on relay systems and wireless network security.
Research Design/Methodology
Research Procedure:
1. Experimental Design
• Use an experimental approach, by theoretical analysis and simulations, to
investigate and study optimized relay systems in wireless networks.
• Experimental setups will involve scheming relay nodes and beamforming in
simulation software’s like MATLAB, AUTOCAD /Proteus, etc. to evaluate the
system performance under various condition.
2. Data Collection and Analysis
• Data will be collected through both existing studies and performing empirical
experiments, simulations, and numerical computations, capturing relevant metrices
such as signal strength, error rates, energy consumption, and network throughput.
• Statistical analysis techniques, analyze experimental data and identify significant
trends, correlations and relationships.
• Data visualization tools such as graphs, charts, and heatmaps will be utilized to
present key findings derived from analysis.
3. Methodological Framework
• Research Method will involve iterative cycles of experimentation, analysis and
refinement.
• Controlled experiments will be conducted using MATLAB and other relative
software’s to investigate specific aspects of relay system, energy efficiency
enhancement, and security measures.
• Simulation studies to help complement the experiments, allowing for scalability
testing and performance evaluation under certain conditions.
4. Interpretation and Conclusion
• Results and experimental findings will be interpreted according to the research
objectives and hypothesis of the proposed system
• Conclusions drawn from the data analysis will be supported by empirical evidence,
theoretical principles, and comparisons with existing literature and techniques.
• Limitations of the research methodology and areas for future investigations will be
1. Introduction
i. Background and context of the research
ii. Objectives and significance of the study
iii. Overview of the research methodology
2. Literature Review
i. Examination of existing literature on relay systems and wireless network security
Discussion of key concepts, theories, and findings from relevant studies
ii. Identification of gaps and limitations in current research
3. Theoretical Framework
i. Explanation of key theoretical concepts and principles underlying relay systems and
energy harvesting
ii. Description of beamforming techniques and their applications in wireless
communication
4. Methodology
i. Detailed explanation of the research design and experimental approach
ii. Description of data collection methods and analysis techniques
iii. Discussion of the simulation tools and software used for experimentation
5. Results
i. Presentation of empirical findings and experimental results
ii. Analysis of data to address research questions and objectives
iii. Visualization of key trends, correlations, and relationships
6. Discussion
i. Interpretation of results in relation to research objectives
ii. Comparison of findings with existing literature and theoretical predictions
iii. Evaluation of implications for relay system design and wireless network security
7. Conclusion
i. Summary of key findings and contributions of the study
8. References
i. List of all sources cited in the research report, citation style in APA referencing.
References
This papers were studied to explored the techniques of relay propagation and beamforming, energy
harvesting and security in wireless communication networks.
i. Lei, W., & Zhan, M. (2016). Beamforming and Antenna Grouping Design for the Multi-Antenna
Relay with Energy Harvesting to Improve Secrecy Rate. Chongqing Key Laboratory of Mobile
Communications Technology, Chongqing University of Posts and Telecommunications,
Chongqing 400065, China. Correspondence: leiwj@cqupt.edu.cn, zhanmhcqupt@163.com.
Academic Editor: Lorenzo Mucchi. Received: 27 April 2016; Accepted: 1 July 2016;
Published: 13 July 2016.
ii. Joshi, N., Yadav, S., & Sharma, S.C. (Year). Experimental Validation of SISO and Diversity
Techniques on MIMO with C-700 Software Defined Radio Platform. Electronics & Computer
Discipline, IIT Roorkee, India 247667. Email: njoshi@pp.iitr.ac.in; Dept. of ECE, IIIT
Allahabad, India 211015. Email: suneel@iiita.ac.in; Electronics & Computer Discipline, IIT
Roorkee, India 247667. Email: scs60fpt@iitr.ac.in.
iii. Rappaport, T. S. (2017). Wireless Communications: Principles and Practice (2nd Edition).
Pearson Education.
iv. Love, D. J., Heath, R. W., & Andrews, M. (Eds.). (2018). Massive MIMO for 5G and Beyond.
IEEE Press.
v. Zeng, Y., Zhang, R., & Lim, T. J. (2016). Wireless Communications with Energy Harvesting:
The Green Communication Era. IEEE Press.
vi. Liu, Y., Liu, J., Zhang, J., & Chen, S. (2019). Physical Layer Security in Cooperative Relay
Networks: A Survey. IEEE Access, 7, 110289-110303.
vii. Wang, X., Han, Z., & Petropulu, A. P. (2017). Wireless Physical Layer Security. Academic
Press.
Websites researched;
i. https://youtube.com/
ii. https://chat.openai.com/
iii. https://www.researchgate.net/
iv. https://ieeexplore.ieee.org/
v. https://matlab.mathworks.com/
vi. https://www.academia.edu/
vii. https://create.microsoft.com/en-us/templates/gantt-charts
Scrolling increment: 10
Project Research
Initiation
1. Establish project Goal Research 100% 22/02/202 3
goals, objectives, and Topic 4
milestones Submission
2. Conduct an extensive Milestone 100% 02/03/202 1
review 4
3. Refine the research Low Risk 100% 07/03/202 5
question based on the 4
literature review
4. Define the Milestone 100% 10/03/202 1
experimental and simulation 4
methodologies
5. Plan data collection Med Risk Research 100% 13/03/202 6
and analysis strategies Proposal 4
Submission
Experiment Setup
and Simulation
1. Prepare empirical High Risk Research 20% 15/03/202 20
experiment Proposal 4
Presentatio
n
2. Implement simulation On Track 10% 21/03/202 10
models using appropriate 4
tools
3. Verify the correctness Low Risk 28/03/202 11
of the simulation framework 4
Data Collection
and Empirical
Experiments
1. Commence data On Track 20% 09/04/202 8
collection from empirical 4
experiments
2. Record relevant Med Risk 10% 02/04/202 14
metrics such as signal 4
strength, energy consumption,
and system performance
3. Conduct simulation On Track 5% 17/04/202 6
experiments based on the 4
defined scenarios
4. Perform initial data Goal 24/04/202 5
analysis to identify trends and 4
patterns
5. Validate experimental Low Risk 30/04/202 9
results against theoretical 4
expectations
Final Data
Analysis and
Adjustment
1. Identify correlations, High Risk 09/05/202 15
significance, and patterns in 4
the results
2. Interpret findings in Med Risk 19/05/202 5
the context of research 4
objectives
3. Address any Med Risk 08/06/202 1
unexpected results and 4
propose explanations
4. Create visualizations Med Risk 17/06/202 4
and graphics to effectively 4
present results
5. Prepare a preliminary Goal 22/06/202 5
draft of the research findings 4
Finalization
and Reporting
1. Develop a Med Risk 25/06/202 5
comprehensive research 4
paper incorporating
Human Ethics
Does this project require Human Ethics Approval? Yes ☐ No ☒
If you have indicated “Yes” you will need to submit the "School of Engineering Form for
Application for Exemption of Human Ethics’, which is available from the School of
Engineering.
Confidentiality
Is confidentiality requested for the Research Report that will be submitted? Yes ☐ No ☒
If you have indicated “Yes” you will need to submit the ‘School of Engineering Form for
Application for Restricted Access to and/or Confidential Examination’ which is available from
the School of Engineering.
Supervisor Details
Signature
X
Hikma Shabani
Dr.
Student Signature
X
Vincent Nanai
Mr.