Breadcrumb

Transmit and receive cooperative cognition: Protocol design and stability analysis
In this paper, we investigate the stability of a cooperative cognitive system. We propose a cooperative secondary transmitter-receiver system (CSTR), where, the secondary transmitter (ST) and the secondary receiver (SR) increase the spectrum availability for the ST packets by relaying the unsuccessfully transmitted packets of the primary transmitter (PT). We assume receiving nodes with multipacket reception capability (MPR). We provide two inner bounds and two outer bounds on the stability region of the considered system. © 2013 ICST - The Institute for Computer Sciences, Social Informatics

Content Delivery in Mobility-Aware D2D Caching Networks
The massive data exchange between base stations and network backhaul creates a strong overhead on mobile networks, especially at peak times. This motivates researchers to think about the proactive caching concept which depends mainly on caching some of the expected data items during off-peak times. The caching problem consists of two distinct phases, placement phase and delivery phase. In this work, we consider a mobility-aware device-to-device (D2D) caching network. We assume that data contents were already cached in users devices during the content placement phase and we focus on the content

Alternate relaying and the degrees of freedom of one-way cellular relay networks
In this paper, a cellular relaying network consisting of two source-destination pairs, and four decode-and-forward relays operating in half-duplex mode is considered. Each source is assisted by two relays and all nodes are equipped with N antennas. In order to compensate for the loss of capacity by a factor of half due to the half-duplex mode, an alternate transmission protocol among the two relays is proposed. An outer bound on the degrees of freedom (DoF) of this system is developed. A constructive proof of achievability based on two different schemes is provided. Aligning the inter-relay

An achievable rate region for a primary network shared by a secondary link
We consider a multiple access primary network with N transmitters. A secondary link of one transmitter and a corresponding receiver causes interference to the primary network. An achievable rate region for the primary network and the secondary link is obtained given the following mode of operation. The secondary transmitter employs rate-splitting so that the primary receiver can decode part of the secondary's signal and cancel it. The secondary receiver, on the other hand, treats primary interference as noise. Given a Gaussian channel model, we investigate the effect of rate-splitting on the

Alternate versus simultaneous relaying in MIMO cellular relay networks: A degrees of freedom study
In this paper, a two-hop cellular relay network consisting of two source-destination pairs equipped with M antennas is considered where each source is assisted by two decode-and-forward relays operating in half-duplex mode and the relays are equipped with N antennas. The DoF of the system is investigated for both simultaneous and alternate relaying configurations. For each relay configuration, an outer bound on the degrees of freedom (DoF) is developed. A new achievable scheme is proposed that meets the upper bound on the maximum DoF for all values of M andN except for M

A degrees of freedom-optimal scheme for SISO X channel with synergistic alternating CSIT
In this paper, the degrees of freedom (DoF) of the two-user single input single output (SISO) X channel are investigated. Three cases are considered for the availability of channel state information at the transmitters (CSIT); perfect, delayed, and no-CSIT. A new achievable scheme is proposed to elucidate the potency of interference creation-resurrection (IRC) when the available CSIT alternates between these three cases. For some patterns of alternating CSIT, the proposed scheme achieves 4/3 DoF, and hence, coincides with the information theoretic upper bound on the DoF of the X channel with

Distributed admission and power control for cognitive radios in spectrum underlay networks
In this paper we investigate admission control and power allocation for cognitive radios in an underlay network. We consider the problem of maximizing the number of supported secondary links under their minimum QoS requirements without violating the maximum tolerable interference on primary receivers in a cellular network. An optimal solution to our problem is shown in previous works to be NP-hard. We propose an efficient distributed algorithm with reasonable complexity that provides results close to the optimum solution without requiring neither a large amount of signaling nor a wide range of

Towards energy efficient relay placement and load balancing in future wireless networks
This paper presents an energy efficient relay deployment algorithm that determines the optimal location and number of relays for future wireless networks, including Long Term Evolution (LTE)-Advanced heterogeneous networks. We formulate an energy minimization problem for macro-relay heterogeneous networks as a Mixed Integer Linear Programming (MILP) problem. The proposed algorithm not only optimally connects users to either relays or eNodeBs (eNBs), but also allows eNBs to switch into inactive mode. This is possible by enabling relay-to-relay communication which forms the basis for relays to

Optimal resource allocation for green and clustered video sensor networks
Wireless video sensor networks (WVSNs) are opening the door for many applications, such as industrial surveillance, environmental tracking, border security, and infrastructure health monitoring. In WVSN, energy conservation is very essential because: 1) sensors are usually battery-operated and 2) each sensor node needs to compress the video prior to transmission, which consumes more power than conventional wireless sensor networks. In this paper, we study the problem of minimizing the total power consumption in a cluster-based WVSN, leveraging cross-layer design to optimize the encoding power
Reliability and Security Analysis of an Entanglement-Based QKD Protocol in a Dynamic Ground-to-UAV FSO Communications System
Quantum cryptography is a promising technology that achieves unconditional security, which is essential to a wide range of sensitive applications. In contrast to optical fiber, the free-space optical (FSO) link is efficiently used as a quantum channel without affecting the polarization of transmitted photons. However, the FSO link has several impairments, such as atmospheric turbulence and pointing errors, which affect the performance of the quantum channel. This paper proposes a quantum key distribution (QKD) scheme that uses a time-bin entanglement protocol over the FSO channel that suffers
Pagination
- Previous page ‹‹
- Page 2
- Next page ››