bbabanner.jpg

Filter by

On the degrees of freedom region of the M × N Interference Channel

In this paper, the K-user MIMO interference channel is considered. The asymmetric DoF region for the channel is studied. The asymmetric DoF represent the set of all achievable DoF combinations {d1, d2,..., dK}. For the three user channel, two cases are presented, the first is when all transmitters and receivers have equal number of antennas M, the other is when each transmitter has M antennas

Software and Communications

Effective capacity of delay-constrained cognitive radio links exploiting primary feedback

In this paper, we study the effective capacity (EC) of cognitive radio (CR) networks operating under statistical quality-of-service (QoS) constraints in an attempt to support real-time applications at the secondary users (SUs). In particular, we analyze the performance gains, in terms of EC and average transmitted power, attributed to leveraging the primary user (PU) feedback overheard at the SU

Software and Communications

On optimal policies in full-duplex wireless powered communication networks

The optimal resource allocation scheme in a full-duplex Wireless Powered Communication Network (WPCN) composed of one Access Point (AP) and two wireless devices is analyzed and derived. AP operates in a full-duplex mode and is able to broadcast wireless energy signals in downlink and receive information data in uplink simultaneously. On the other hand, each wireless device is assumed to be

Software and Communications

Novel cooperative policy for cognitive radio networks: Stability region and delay analysis

We consider a cognitive radio system that consists of primary user, secondary user, and their destinations. The secondary user has a relaying capability, i.e., it transmits the relayed packets from the primary user. Unlike most of the previous works that restrict the secondary user to transmit only in the idle time slots, we assume that the secondary user interferes on the primary user with

Software and Communications

Stability Analysis of Slotted Aloha with Opportunistic RF Energy Harvesting

Energy harvesting (EH) is a promising technology for realizing energy-efficient wireless networks. In this paper, we utilize the ambient RF energy, particularly interference from neighboring transmissions, to replenish the batteries of the EH enabled nodes. However, RF energy harvesting imposes new challenges into the analysis of wireless networks. Our objective in this paper is to investigate the

Software and Communications

A feedback-soft sensing-based cognitive access scheme with feedback erasures

In this paper, we examine a cognitive spectrum access scheme in which a secondary user exploits the primary feedback information. We consider an overlay model in which the secondary user accesses the channel by certain access probabilities that are function of the spectrum sensing metric. In setting our problem, we assume that the secondary user can receive the primary link's feedback automatic

Circuit Theory and Applications
Software and Communications

Proactive location-based scheduling of delay-constrained traffic over fading channels

In this paper, proactive resource allocation based on user location for point-to-point communication over fading channels is introduced, whereby the source must transmit a packet when the user requests it within a deadline of a single time slot. We introduce a prediction model in which the source predicts the request arrival Tp slots ahead, where Tp denotes the prediction window (PW) size. The

Software and Communications

Energy-Aware Cooperative Wireless Networks with Multiple Cognitive Users

In this paper, we study and analyze cooperative cognitive radio networks with arbitrary number of secondary users (SUs). Each SU is considered a prospective relay for the primary user (PU) besides having its own data transmission demand. We consider a multi-packet transmission framework that allows multiple SUs to transmit simultaneously because of dirty-paper coding. We propose power allocation

Software and Communications

On the coexistence of a primary user with an energy harvesting secondary user: A case of cognitive cooperation

In this paper, we consider a cognitive scenario where an energy harvesting secondary user shares the spectrum with a primary user. The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues: a queue for storing its

Software and Communications

Using network coding to achieve the capacity of deterministic relay networks with relay messages

In this paper, we derive the capacity of the deterministic relay networks with relay messages. We consider a network that consists of five nodes, four of which can only communicate via the fifth one. However, the fifth node is not merely a relay as it may exchange private messages with the other network nodes. First, we develop an upper bound on the capacity region based on the notion of a single

Software and Communications