bbabanner.jpg

Filter by

Throughput maximization via adjusting packet size of a buffered cognitive radio user

In this paper, we investigate a cognitive scenario with one secondary user and one primary user. Users are assumed to be buffered terminals. Each user has certain arrival rate with certain packet size. We propose a scheme where the cognitive radio user (secondary user) may combine some of the arrived packets into a single larger packet or split each of them into smaller packets to increase its

Software and Communications

Degrees of freedom for a two-cell relay network with soft handoffs

In this paper we investigate the degrees of freedom of a cellular relay network that consists of two base stations, two mobile stations and four decode-and-forward relays. The base stations and the mobile stations are equipped with M antennas each, whereas the relays are equipped with N antennas each. In addition, each base station has an independent message to each mobile station. The relays are

Software and Communications

The quest for user similarity in mobile societies

In this paper we explore the notion of mobile users' similarity as a key enabler of innovative applications hinging on opportunistic mobile encounters. In particular, we analyze the performance of known similarity metrics, applicable to our problem domain, as well as propose a novel temporal-based metric, in an attempt to quantify the inherently qualitative notion of similarity. Towards this

Software and Communications

Improved spectrum mobility using virtual reservation in collaborative cognitive radio networks

Cognitive radio technology would enable a set of secondary users (SU) to opportunistically use the spectrum licensed to a primary user (PU). On the appearance of this PU on a specific frequency band, any SU occupying this band should free it for PUs. Typically, SUs may collaborate to reduce the impact of cognitive users on the primary network and to improve the performance of the SUs. In this

Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness

The deterministic multicast capacity of 4-node relay networks

In this paper, we completely characterize the deterministic capacity region of a four-node relay network with no direct links between the nodes, where each node communicates with the three other nodes via a relay. Towards this end, we develop an upper bound on the deterministic capacity region, based on the notion of a one-sided genie. To establish achievability, we use the detour schemes that

Software and Communications
Agriculture and Crops

Optimal random access for a cognitive radio terminal with energy harvesting capability

We consider a cognitive radio scenario with an energy harvesting secondary user (SU) attempting to access a primary channel randomly. We assume multipacket reception (MPR) capability and investigate a system in which the SU may or may not exploit the primary feedback messages. The access probabilities are obtained to maximize the secondary throughput under the constraints of primary queue
Software and Communications
Agriculture and Crops

A feedback-soft sensing-based access scheme for cognitive radio networks

In this paper, we examine a cognitive spectrum access scheme in which secondary users exploit the primary feedback information. We consider an overlay secondary network employing a random access scheme in which secondary users access the channel by certain access probabilities that are functions of the spectrum sensing metric. In setting our problem, we assume that secondary users can eavesdrop on

Circuit Theory and Applications
Software and Communications

The deterministic capacity of relay networks with relay private messages

We study the capacity region of a deterministic 4-node network, where 3 nodes can only communicate via the fourth one. However, the fourth node is not merely a relay since it can exchange private messages with all other nodes. This situation resembles the case where a base station relays messages between users and delivers messages between the backbone system and the users. We assume an asymmetric

Software and Communications

Maximizing the signal to leakage ratio in downlink cellular networks

A transmission scheme is developed for the downlink frame of cellular networks. While the mobile stations (MSs) maximize the signal power from the serving base station (BS), each BS aims at balancing the signal power of its users with the interference caused at the MSs of the neighboring cells, based on an approximated performance metric. A closed form solution for the beamforming vectors of the

Software and Communications

Empirical correction of the Okumura-Hata model for the 900 MHz band in Egypt

This paper studies the performance of the Okumura-Hata model in the 900 MHz band. The results of several measurement campaigns carried out in different regions of Egypt show significant errors in the Okumura-Hata model. The paper, hence, introduces correction to the Okumura-Hata model that suits the Egyptian 900 MHz cellular environment. The correction is evaluated empirically by fitting the

Software and Communications