bbabanner.jpg

Filter by

On the stable throughput of cooperative cognitive radio networks with finite relaying buffer

In this paper, we study the problem of cooperative communications in cognitive radio systems where the secondary user has limited relaying room for the overheard primary packets. More specifically, we characterize the stable throughput region of a cognitive radio network with a finite relaying buffer at the secondary user. Towards this objective, we formulate a constrained optimization problem for

Software and Communications

Probabilistic band-splitting for a buffered cooperative cognitive terminal

In this paper, we propose a cognitive protocol that involves cooperation between the primary and secondary users. In addition to its own queue, the secondary user (SU) has a queue to store, and then relay, the undelivered primary packets. When the primary queue is nonempty, the SU remains idle and attempts to decode the primary packet. When the primary queue is empty, the SU splits the total

Software and Communications

Throughput maximization via adjusting packet size of a buffered cognitive radio user

In this paper, we investigate a cognitive scenario with one secondary user and one primary user. Users are assumed to be buffered terminals. Each user has certain arrival rate with certain packet size. We propose a scheme where the cognitive radio user (secondary user) may combine some of the arrived packets into a single larger packet or split each of them into smaller packets to increase its

Software and Communications

Degrees of freedom for a two-cell relay network with soft handoffs

In this paper we investigate the degrees of freedom of a cellular relay network that consists of two base stations, two mobile stations and four decode-and-forward relays. The base stations and the mobile stations are equipped with M antennas each, whereas the relays are equipped with N antennas each. In addition, each base station has an independent message to each mobile station. The relays are

Software and Communications

The quest for user similarity in mobile societies

In this paper we explore the notion of mobile users' similarity as a key enabler of innovative applications hinging on opportunistic mobile encounters. In particular, we analyze the performance of known similarity metrics, applicable to our problem domain, as well as propose a novel temporal-based metric, in an attempt to quantify the inherently qualitative notion of similarity. Towards this

Software and Communications

Improved spectrum mobility using virtual reservation in collaborative cognitive radio networks

Cognitive radio technology would enable a set of secondary users (SU) to opportunistically use the spectrum licensed to a primary user (PU). On the appearance of this PU on a specific frequency band, any SU occupying this band should free it for PUs. Typically, SUs may collaborate to reduce the impact of cognitive users on the primary network and to improve the performance of the SUs. In this

Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness

The deterministic multicast capacity of 4-node relay networks

In this paper, we completely characterize the deterministic capacity region of a four-node relay network with no direct links between the nodes, where each node communicates with the three other nodes via a relay. Towards this end, we develop an upper bound on the deterministic capacity region, based on the notion of a one-sided genie. To establish achievability, we use the detour schemes that

Software and Communications
Agriculture and Crops

Optimal random access for a cognitive radio terminal with energy harvesting capability

We consider a cognitive radio scenario with an energy harvesting secondary user (SU) attempting to access a primary channel randomly. We assume multipacket reception (MPR) capability and investigate a system in which the SU may or may not exploit the primary feedback messages. The access probabilities are obtained to maximize the secondary throughput under the constraints of primary queue
Software and Communications
Agriculture and Crops

A feedback-soft sensing-based access scheme for cognitive radio networks

In this paper, we examine a cognitive spectrum access scheme in which secondary users exploit the primary feedback information. We consider an overlay secondary network employing a random access scheme in which secondary users access the channel by certain access probabilities that are functions of the spectrum sensing metric. In setting our problem, we assume that secondary users can eavesdrop on

Circuit Theory and Applications
Software and Communications

The deterministic capacity of relay networks with relay private messages

We study the capacity region of a deterministic 4-node network, where 3 nodes can only communicate via the fourth one. However, the fourth node is not merely a relay since it can exchange private messages with all other nodes. This situation resembles the case where a base station relays messages between users and delivers messages between the backbone system and the users. We assume an asymmetric

Software and Communications