bbabanner.jpg

Filter by

Multiuser MIMO relaying under quality of service constraints

We consider a wireless communication scenario with K source-destination pairs communicating through several half-duplex amplify-and-forward relays. We design the relay beamforming matrices by minimizing the total power transmitted from all the relays subject to quality of service constraints on the received signal to interference-plus-noise ratio at each destination node. We propose a novel method

Software and Communications
Innovation, Entrepreneurship and Competitiveness

AROMA: Automatic generation of radio maps for localization systems

Current methods for building radio maps for wireless localization systems require a tedious, manual and error-prone calibration of the area of interest. Each time the layout of the environment is changed or different hardware is used, the whole process of location fingerprinting and constructing the radio map has to be repeated. The process gets more complicated in the case of localizing multiple

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

Joint power allocation and beamforming for multiuser MIMO two-way relay networks

In this paper, a multiuser cellular two-way relaying scenario is considered where multiple single-antenna mobile stations (MSs) and one multiple-antenna base station (BS) communicate, bidirectionally, via one half-duplex multiple-antenna relay station (RS). Furthermore, the case when the number of antennas at the RS is not sufficient to decode the individual messages is addressed. For this case, a

Circuit Theory and Applications
Software and Communications

A feedback-based access scheme for cognitive radio systems

In this paper, we consider the design of access schemes for secondary users in cognitive radio systems based on the primary user feedback information. We consider a secondary user employing a random access scheme with an access probability that depends on the primary user feedback state. We show that the proposed scheme can enhance the system performance in terms of the secondary throughput and/or

Circuit Theory and Applications
Software and Communications

Synthetic generation of radio maps for device-free passive localization

In this paper, we present the design, implementation, and evaluation of a system that automatically constructs accurate radio maps for device-free WLAN localization systems. The system is capable of generating deterministic and probabilistic radio maps for localization systems. Our system uses 3D ray tracing enhanced with the uniform theory of diffraction (UTD) to model the electric field behavior

Software and Communications

Interference alignment for secrecy

This paper studies the frequency/time selective K-user Gaussian interference channel with secrecy constraints. Two distinct models, namely the interference channel with confidential messages and the interference channel with an external eavesdropper, are analyzed. The key difference between the two models is the lack of channel state information (CSI) of the external eavesdropper. Using

Artificial Intelligence
Software and Communications

Adaptive sensing and transmission durations for cognitive radios

In a cognitive radio setting, secondary users opportunistically access the spectrum allocated to primary users. Finding the optimal sensing and transmission durations for the secondary users becomes crucial in order to maximize the secondary throughput while protecting the primary users from interference and service disruption. In this paper an adaptive sensing and transmission scheme for

Software and Communications

Admission and power control for spectrum sharing cognitive radio networks

We investigate the problem of admission and power control considering a scenario where licensed, or primary, users and cognitive radios, or secondary users, are transmitting concurrently over the same band. The primary users share a common receiver and the interference on this receiver from secondary users should be strictly limited to a certain level. Each secondary link is assumed to have a

Software and Communications

On the enhancement of LDPC codes used in WiMAX

In this paper the low density party check (LDPC) codes used in the IEEE 802.16 standard physical layer are studied, and two novel techniques to enhance the performance of such codes are introduced. In the first technique, a novel parity check matrix for LDPC codes over GF(4) with the non-zero entries chosen to maximize the entropy is proposed, the parity check matrix is based on the binary parity

Software and Communications

Achievable degrees of freedom of the K-user interference channel with partial cooperation

In this paper, we consider the K-user interference channel with partial cooperation, where a strict subset of the K users cooperate. For the K-user interference channel with cooperating subsets of length M, the outer bound of the total degrees of freedom is KM/(M+1). In this paper, we propose a signal space-based interference alignment scheme that proves the achievability of these degrees of

Software and Communications