The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper develops a comprehensive framework for the performance analysis of user-centric capacity-driven small cell deployments, where small cell BSs (SBSs) are deployed at the places of high user density, i.e., user hotspots. In order to incorporate the correlation between user and SBS locations, we model the geographical centers of user hotspots as a homogeneous Poisson point process (PPP) around...
In this paper, we characterize the joint coverage probability at two spatial locations in a cellular network. In particular, modeling the locations of cellular base stations (BSs) as a Poisson Point Process (PPP), we study interference correlation at two spatial locations and separated by a distance $v$, when user follows closest BS association policy at both spatial locations and moves...
In this paper we develop a comprehensive analytical framework for a cellular network enhanced with in-band device-to-device (D2D) communication capability where the D2D links reuse the downlink resources of the cellular links. The locations of the cellular base stations (BSs) are modeled as a Poisson point process (PPP). The user positions are modeled as a Thomas cluster process (TCP) to capture the...
In this work, we model and analyze a cellular system that operates in the licensed band of the 3.5 GHz spectrum and consists of a licensed and an unlicensed operator. Using tools from stochastic geometry, we study the co-existence of these networks from the perspective of the unlicensed operator. We model the licensed base station (BS) locations as a homogeneous Poisson point process with protection...
We present a general mathematical framework to characterize the performance of an arbitrarily-located reference receiver in a finite wireless network. Modeling the locations of nodes as a uniform binomial point process (BPP), we derive the general k-coverage probability, which is the distribution of the signal-to-interference ratio (SIR) at the reference receiver when it connects to its k-th closest...
This paper studies the secrecy performance in wireless networks (primary network) overlaid with an ambient RF energy harvesting network (secondary network). The nodes in the secondary network are assumed to be solely powered by ambient RF energy harvested from transmissions of the primary network. We assume that the secondary nodes can eavesdrop on the primary transmissions due to which the primary...
In this work, we analyze the uplink performance of a massive multiple input multiple output network with asymptotically large number of antennas at the base stations. Following the usual approach, we first derive the characteristic function of interference and use the classical Gil-Palaez inversion theorem to obtain the coverage probability expression. However, since the resulting expression does...
The growing complexity of heterogeneous cellular networks (HetNets) has necessitated the need to consider variety of user and base station (BS) configurations for realistic performance evaluation and system design. This is directly reflected in the HetNet simulation models considered by standardization bodies, such as the third generation partnership project (3GPP). Complementary to these simulation...
This paper studies the downlink performance of a cellular-based internet-of-things (IoT) network where the receiving devices are solely powered by energy harvested from the ambient radio frequency (RF). Assuming that the cellular network is the only source of RF energy, we consider a time-division based approach for power and information transfer where each time slot is partitioned into two sub-lots:...
The blocking of line-of-sight between anchors and targets by distributed (i.e., non-point) obstacles in an environment can create blind-spots in a localization network if there are an insufficient number of unblocked anchors. The spatial randomness of the obstacle and anchor locations makes it difficult to characterize the blind-spot probability of a network. In this paper, we use tools from stochastic...
Cache-enabled device-to-device (D2D) networks turn memory of the devices at the network edge, such as smart phones and tablets, into bandwidth by enabling asynchronous content sharing directly between proximate devices. Limited storage capacity of the mobile devices necessitates the determination of optimal set of contents to be cached on each device. In order to study the problem of optimal cache...
In this paper, we model a finite network of unmanned aerial vehicle (UAV) base stations as a uniform binomial point process (BPP) and derive exact expression for the coverage probability of a target receiver located on the ground. For cell selection, the target receiver is assumed to connect to the closest UAV. Since Rayleigh fading assumption is not quite reasonable in this case, the convenient exponential...
The ubiquity of cellular networks makes them a preferred choice for geolocation in places that lack GPS coverage. While the analysis of cellular-based geolocation has traditionally been driven by simulation-based approaches, the increasing irregularity in the base station (BS) locations facilitate the use of powerful mathematical tools from stochastic geometry for their performance analysis. In this...
In this paper, we analyze jamming against wireless networks from an error probability perspective. Specifically, we investigate the impact of a fixed number of jammers against a network of base stations (BS) or access points (AP). We first derive analytical expressions for the error probability of a victim receiver in the downlink of this wireless network and later study whether or not some recent...
Current approaches to the analysis of heterogeneous cellular networks (HetNets) with random spatial models assume users to be distributed according to a homogeneous Poisson Point Process (PPP) independently of the base station (BS) locations. In reality, however, current deployments are capacity-driven, which correlates the BS and user locations. In this paper, we develop tools for the downlink analysis...
Machine-to-machine (M2M) communication's severe power limitations challenge the interconnectivity, access management, and reliable communication of data. In densely deployed M2M networks, coordinating and aggregating the generated data is critical. We propose an energy efficient data aggregation scheme for a hierarchical M2M network with truncated power control. We optimize the number of hierarchical...
In this paper, we develop a comprehensive analytical framework to characterize the performance of device-centric content availability in device-to-device (D2D) networks. Modeling the locations of devices as a variant of Thomas cluster process, we derive the coverage probability of a typical device when its content of interest is available at its kth closest device within the same cluster. Using the...
To maintain tractability, interference field is often modeled as a homogeneous Poisson Point Process (PPP) in the analysis of wireless networks. While it provides meaningful firstorder results, it falls short in modeling the effect of interference management techniques, which typically introduce some form of spatial interaction among transmitters. In some applications, such as cognitive radio and...
We develop a comprehensive analytical framework with foundations in stochastic geometry to characterize the performance of cluster-centric content placement in a device-to-device (D2D) network. Different from device-centric content placement, cluster-centric placement focuses on placing content in each cluster such that the collective performance of all the devices in each cluster is optimized. Modeling...
In this paper, we examine, via analysis, the improvement in device localizability through collaboration. Depending on the sensitivity of the receivers in the devices, it is not unusual for an unlocalized device to lack a sufficient number of detectable positioning signals from localized devices to determine its location without ambiguity (i.e., to be uniquely localizable). This occurrence is well-known...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.