bbabanner.jpg

Filter by

QOS-constrained multiuser peer-to-peer amplify-and-forward relay beamforming

A wireless communication scenario is considered with K single-antenna source-destination pairs communicating through several half-duplex amplify-and-forward MIMO relays where each source is targeting only one destination. The relay beamforming matrices are designed in order to minimize the total power transmitted from the relays subject to quality of service constraints on the received signal to

Software and Communications

Keys through ARQ: Theory and practice

This paper develops a novel framework for sharing secret keys using the Automatic Repeat reQuest (ARQ) protocol. We first characterize the underlying information theoretic limits, under different assumptions on the channel spatial and temporal correlation function. Our analysis reveals a novel role of dumb antennas in overcoming the negative impact of spatial correlation on the achievable secrecy

Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Multiuser MIMO relaying under quality of service constraints

We consider a wireless communication scenario with K source-destination pairs communicating through several half-duplex amplify-and-forward relays. We design the relay beamforming matrices by minimizing the total power transmitted from all the relays subject to quality of service constraints on the received signal to interference-plus-noise ratio at each destination node. We propose a novel method

Software and Communications
Innovation, Entrepreneurship and Competitiveness

AROMA: Automatic generation of radio maps for localization systems

Current methods for building radio maps for wireless localization systems require a tedious, manual and error-prone calibration of the area of interest. Each time the layout of the environment is changed or different hardware is used, the whole process of location fingerprinting and constructing the radio map has to be repeated. The process gets more complicated in the case of localizing multiple

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

Joint power allocation and beamforming for multiuser MIMO two-way relay networks

In this paper, a multiuser cellular two-way relaying scenario is considered where multiple single-antenna mobile stations (MSs) and one multiple-antenna base station (BS) communicate, bidirectionally, via one half-duplex multiple-antenna relay station (RS). Furthermore, the case when the number of antennas at the RS is not sufficient to decode the individual messages is addressed. For this case, a

Circuit Theory and Applications
Software and Communications

A feedback-based access scheme for cognitive radio systems

In this paper, we consider the design of access schemes for secondary users in cognitive radio systems based on the primary user feedback information. We consider a secondary user employing a random access scheme with an access probability that depends on the primary user feedback state. We show that the proposed scheme can enhance the system performance in terms of the secondary throughput and/or

Circuit Theory and Applications
Software and Communications

Synthetic generation of radio maps for device-free passive localization

In this paper, we present the design, implementation, and evaluation of a system that automatically constructs accurate radio maps for device-free WLAN localization systems. The system is capable of generating deterministic and probabilistic radio maps for localization systems. Our system uses 3D ray tracing enhanced with the uniform theory of diffraction (UTD) to model the electric field behavior

Software and Communications

Interference alignment for secrecy

This paper studies the frequency/time selective K-user Gaussian interference channel with secrecy constraints. Two distinct models, namely the interference channel with confidential messages and the interference channel with an external eavesdropper, are analyzed. The key difference between the two models is the lack of channel state information (CSI) of the external eavesdropper. Using

Artificial Intelligence
Software and Communications

Adaptive sensing and transmission durations for cognitive radios

In a cognitive radio setting, secondary users opportunistically access the spectrum allocated to primary users. Finding the optimal sensing and transmission durations for the secondary users becomes crucial in order to maximize the secondary throughput while protecting the primary users from interference and service disruption. In this paper an adaptive sensing and transmission scheme for

Software and Communications

Admission and power control for spectrum sharing cognitive radio networks

We investigate the problem of admission and power control considering a scenario where licensed, or primary, users and cognitive radios, or secondary users, are transmitting concurrently over the same band. The primary users share a common receiver and the interference on this receiver from secondary users should be strictly limited to a certain level. Each secondary link is assumed to have a

Software and Communications