The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Anti-jamming interference alignment (IA) algorithm is an effective method to battle with adversarial jammers. Nevertheless, the abundant power from the jammers and interferences can be harvested by the legitimate users as a natural power supply. In this paper, we propose a novel anti-jamming IA scheme with wireless energy harvesting (EH). In the scheme, the power partition coefficient and transmit...
In this paper, we propose an anti-interference cooperative spectrum sharing strategy based on fairness secondary users selection where the secondary system can gain spectrum access to the primary system. Specifically, secondary user STb and STq are selected to transmit the primary and secondary signal by using different bandwidth in the second transmission slot which occupies a part of the whole transmission...
In this paper we proposed a cooperative spectrum sharing protocol with two-way decode-and-forward (DF) relaying. Specifically, two primary users A and B communicate with each other with the assistant of the secondary user S. The secondary user uses a fraction of power to forward the primary signals by acting as a DF relay. As a reward, the secondary user can gain spectrum access by using the remaining...
In this paper, a cooperative spectrum sharing protocol with quality-of-service (QoS) support for both of the primary and secondary systems is proposed. Specifically, the secondary system gains primary spectrum access by allocating a fraction of its power to forward the primary signal helping the primary system achieve the target rate, and meanwhile exploits the remaining power to transmit its own...
Driving fatigue detection is an important approach to ensure the traffic safety. However, the most existing mature analysis methods are based on driving behavior or driver's body characteristics, which leads to the low accuracy and predictability. The EEG signal analysis is proved to an effective way to reflect the fatigue state in medical science, thus this paper explores the EEG signal to detect...
In this paper, we propose a resource allocation scheme for interference management in heterogeneous networks. We particularly consider downlink interference from a Home eNB (HeNB) to macrocell user equipments (MUEs) in the coverage of the traditional macrocell basestation (MBS). By overhearing uplink feedback information from MUEs and Home User Equipments (HUEs) together with downlink control information...
Human body communication (HBC) is an emerging communication technique for wireless body area networks, which has recently been included in IEEE802.15.6 standard. The HBC transmitter uses the frequency selective digital transmission (FSDT) scheme, where Walsh code are used to spread the information bits. The data rate of this system is limited to 1.3125 Mbps, due to the limited set of spreading codes...
We propose a scheme for interference management in wireless heterogeneous networks. We, specifically, consider the problem of downlink interference of a Home eNB (HeNB) to nearby macrocell user equipments (MUEs) served by a macrocell base station. We propose a distributed, self-learning channel access mechanism that enables the HeNB to adaptively change its access to channels shared with neighboring...
An integrated 3–5 GHz impulse radio ultrawideband (IR-UWB) wireless transceiver SoC for wireless body area network (WBAN) applications is reported in this paper. To enhance system robustness against narrow band interference (NBI) signals, receiver low noise amplifier (LNA) input matching network is optimized to reject outband NBI below 2.5 GHz. A non-coherent energy detection scheme using analog squarer...
In cognitive radio, cooperative detection through optimization can improve the performance of spectrum sensing. In this paper, the optimal selection of cognitive radios including threshold optimization and cognitive radio's selection optimization is proposed, and the sensing mechanism including sensing period optimization and sensing time optimization is also analyzed. The proposed optimization algorithm...
We investigate distributed frequency allocation problem in dynamic environment of cognitive radio (CR) networks with a stochastic game (SG) model. Traditional multi-agent reinforcement learning (MARL) algorithms, as the primary online strategy learning algorithms of SG game, are not suitable for the application of wireless communication. Hence, a new MARL algorithm, maximizing the average Q function...
This paper presents the performance comparison of interleave division multiple access (IDMA) and code division multiple access (CDMA) systems based on Simulink. We investigate the basic principle that illustrates the similarities and differences of the two different schemes. According to these schemes, we analyze every model function and build simulation platforms for these systems. The simulation...
In this paper, we present a Wireless Local Area Network (WLAN) channel selection algorithm and testbed implementation for video streaming applications. We call this type of spectrum management functionality Channel Pool Management (CPM). Specifically, we designed a scheme called Shifted Mask Superposition (SMS) that harnesses the transmitter spectral mask to help predict WLAN channel quality dynamically...
We study optimal transmission strategies in multi-channel cognitive radio networks where one secondary user (SU) opportunistically accesses multiple orthogonal channels that are owned and utilized by primary users (PU). In dynamic spectrum access networks, the protection of PU's is vital, since no PU would accommodate SU access to its own detriment. Therefore the objective of the problem we study...
We venture beyond the "listen-before-talk" strategy that is common in many traditional cognitive radio access schemes. We exploit the bi-directional nature of most primary communication systems. By intelligently choosing their transmission parameters based on the observation of primary user (PU) communications, secondary users (SUs) in a cognitive network can achieve higher spectrum usage...
Cognitive radio (CR) is viewed as a novel approach for improving the utilization of a precious natural resource: the radio electromagnetic spectrum. Spectrum sensing is a primary task of CR. At first, this article makes an overview of the background and concept of CR. Then focused on spectrum sensing of CR in OFDM, we put forward energy detection based on OFDM. Last this article provides two spectrum...
In cognitive wireless networks where secondary users (SUs) opportunistically access spectral white spaces of primary users (PUs), there exists an inherent tradeoff between sensing and transmission due to the competing goals of PU protection and SU access maximization. This paper studies means of sensing-transmission for SUs to better manage the competing goals by defining utility function to reward...
Cognitive radio networks enable secondary users to utilize spare bandwidth of primary users by limiting their interference. Moving beyond the traditional listen-before-talk paradigm, we propose a cognitive access methodology that exploits the feedback channel in two-way primary communication links for better spectrum utility and protection of primary users against secondary interference. We let secondary...
Based on the characteristics of cognitive radio (CR) and the transmission features of OFDM, this article offers the algorithms for the spectrum allocation in OFDM. Aiming at the probability of detection by the CR and the upper limit of the noise which can be suffered by the authorized user, CR achieves the maximal channel capability through the allocation of the sub-carriers and the power. This article...
The listen-Before-Talk (LBT) strategy has been prevalent in cognitive radio networks where secondary users opportunistically access under-utilized primary band. To minimize the amount of disruption from secondary users to primary signals, secondary users generally are required to detect the presence of the primary user reliably, and access the spectrum intelligently. The sensing time has to be long...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.