@article {Bouanani2022, title = {On the Secrecy Analysis of Dual-Hop SWIPT-based Multi-Source Underlay Cognitive Radio Networks}, journal = {IEEE Transactions on Cognitive Communications and Networking}, year = {2022}, note = {cited By 0}, pages = {1-1}, abstract = {This paper investigates the intercept probability (IP) performance for a dual-hop multi-secondary user (SU) underlay cognitive-radio networks. Whereby, the relay R is self-powered by harvesting energy from secondary sources using the time switching variant (TS) of simultaneous wireless information and power transfer (SWIPT) protocol. Single-antenna SUs are transmitting data to multi-antennas end-user D, performing maximal-ratio combining (MRC) diversity technique, through R in presence of (i) a primary network composed of a primary transmitter (PUt) and receiver (PUr) pair, and (ii) a passive eavesdropper at each hop (i.e., E1 and E2), attempting to overhear the communication. Moreover, we suppose that the second eavesdropper has multiple antennas and employs the MRC technique, that the relay employs the Decode-and-Forward relaying protocol, that the two hops are subject to the Rayleigh fading model, and that the channel state information is fully known at both D and E2. Because of the underlying strategy, the SUs are constantly modifying their transmit powers to prevent interference with primary users. A closed-form expression of the IP is obtained by taking into consideration the correlation between the secrecy capacities for both hops. The impact of other essential factors on IP, such as the transmit power of sources, the fading severity parameter, and the maximum tolerable interference power (MTIP), is also investigated. Specifically, we want to know if the energy harvester (i.e., relay) might improve the security of such a system even more for low MTIP or transmit power of SUs. Monte Carlo simulations verify all of the obtained results, and valuable insights into the secrecy of the considered system are achieved. IEEE}, keywords = {Channel state information, Cognitive radio, Cognitive radio network, Communication channels (information theory), Dual-hop networks, Eavesdropping, Energy harvesting, Information and power transfers, Intelligent systems, Intercept probability, Intercept probability network, Interference, Internet protocols, Monte Carlo methods, Network layers, Network security, Physical layer security, Radio systems, Rayleigh fading, Receiver, Relay, Secure communication, Signal receivers, Signal to noise ratio, Simultaneous wireless information and power transfer, Underlay cognitive radio network, Underlay cognitive radios}, doi = {10.1109/TCCN.2022.3217780}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85141508701\&doi=10.1109\%2fTCCN.2022.3217780\&partnerID=40\&md5=79af2dcf046827ee8c634d461186ab82}, author = {Bouanani, F.E. and Lahmar, I. and Ismaili, Z.E.A.A. and Qaraqe, K.A.} } @article {Chentouf20186855, title = {A new physical design approach for setup timing optimization in 7 nm global routed designs}, journal = {Journal of Engineering and Applied Sciences}, volume = {13}, number = {16}, year = {2018}, pages = {6855-6859}, doi = {10.3923/jeasci.2018.6855.6859}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85054639024\&doi=10.3923\%2fjeasci.2018.6855.6859\&partnerID=40\&md5=e4470513ba81a36fcc1eb2a9d14feff3}, author = {Chentouf, M. and Cherif, L. and Ismaili, Z.E.A.A.} }