The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a robust optimization framework for the multiple-access problem in a hospital environment. The users of e-Health applications (referred to as secondary users) coexist with active and passive medical devices (referred to as primary and protected users, respectively) under uncertainty in the channel (i.e. propagation) conditions. In particular, we design robust transmission scheduling and...
Recently, there has been growing interest in secure communication via multi-antenna physical-layer designs. In this paper, we consider a transmit covariance design for a secrecy rate maximization problem under a multicast scenario, where a multi-antenna transmitter delivers a common confidential message to multiple single-antenna receivers in the presence of multiple multi-antenna eavesdroppers. This...
For the Multiuser Multiple-Input Single-Output (MUMISO) system in a downlink (DL) scenario, we design a non-linear precoding scheme, namely the spatial Tomlinson-Harashima precoder (S-THP) based on the total mean squared error (MSE) criterion. The channel state information (CSI) available at the transmitter for the precoding is the quantized channel direction information (CDI) relayed back in a frequency...
In this paper we derive the optimal space-time power allocation scheme that minimizes the BER for MIMO fading channels when ideal channel state information (CSI) is available at the transmitter and receiver. We then show that this scheme achieves exponential diversity. Simulation results corroborating the theoretical analysis are then presented for MIMO Rician fading channels where we show that for...
This paper proposes a location-based MAC (LMAC) scheme for wireless networks with randomly placed nodes. This scheme regulates channel access by sharing local location information among transmitters. A lattice approximation approach is used to derive upper and lower bound for the success probability for a typical transmission attempt. Numerical results show that with the node density and link distance...
Multi-Packet Reception (MPR) enables simultaneous receptions from different transmitters to a single receiver, which has been demonstrated to bring capacity improvement in wireless network. However, MPR does not improve the transmission capability of intermediate relay nodes in a multi-hop routing and thus these nodes may become the bottlenecks for increasing throughput despite of great reception...
Deploying energy harvesting nodes can significantly extend the lifetime of a battery powered wireless network. The nature of these systems calls for specific design principles to efficiently utilize the dynamic energy resources. In contrast to the conventional wireless networks, transmission policies for these systems should take into account the recharge process of the node as well as its battery...
In this paper we study the long-term throughput performance of repetition protocols coupled with power control for multiple access block-fading channels. We propose to use the feedback bits to inform the transmitter about the decoding status and the instantaneous channel quality. We determine the throughput of simple and practically inspired protocols; we show remarkable throughput improvements, especially...
A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel state information (CSI) of the secondary link, but knows only the statistics and an estimated version of the secondary transmitter-primary receiver (ST-PR) link, is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels (with...
In wireless X networks where all transmitters send the independent messages to all receivers, the theoretical degrees of freedom (DOF) and interference alignment (IA) scheme for its achievability are given by Cadambe and Jafar. However, IA scheme for wireless X network may be infeasible in practice unless the transmitters have the perfect channel information. In addition, if the transmitter with single...
Cognitive Radio (CR) networks are emerging as a viable candidate to resolve the conflict between increasing demand for spectrum and spectrum shortage. The essential purpose of a CR network is to improve the network spectrum efficiency, which, however, may not be achieved if a CR network is inappropriately configured. In decentralized overlaid networks, the throughput of the primary network will decrease...
We consider a set of cognitive nodes cooperatively sensing the activities of a primary system. Two cooperative protocols are proposed, where cognitive nodes opportunistically transmit to each others, and finally each node makes a decision based its own observations. In the first protocol (Protocol~1), a node relays the signal received from the primary to the other nodes only if the signal energy is...
In MIMO-OFDM communications, the channel state information (CSI) of the forward link is needed for precoder design at the transmitter to achieve the maximal performance gains. In frequency division duplex (FDD) systems, the CSI estimated at the receivers needs to be fed back to the transmitters. Because of the limited network resources, there will be CSI feedback errors due to quantization, delay...
Block Diagonalization (BD) algorithm is a generalization of channel inversion scheme in multiuser multi-input multi-output (MIMO) broadcast channels. Although the BD algorithm is effective in removing interuser interference, it has a drawback that additional information should be delivered to the receiver. Recent work on BD with vector perturbation (VP) avoids the need for additional information and...
In previous works, Vandermonde-subspace frequency division multiplexing (VFDM) has been shown to promote overlay networks by enabling a secondary transmitter to cancel its interference to a primary receiver, while simultaneously transmitting useful information to its own receiver at nonnegligible rates. Interference cancelation is achieved by exploiting the null-space of the channel from the secondary...
The performance of a novel fountain coding scheme based on maximum distance separable (MDS) codes constructed over Galois fields of order q>=2 is investigated. Upper and lower bounds on the decoding failure probability under maximum likelihood decoding are developed. Differently from Raptor codes (which are based on a serial concatenation of a high-rate outer block code, and an inner Luby-transform...
In this paper, we investigate the transmission completion time minimization problem in a two-user additive white Gaussian noise (AWGN) broadcast channel, where the transmitter is able to harvest energy from the nature. The harvested energy is modeled to arrive at the transmitters randomly. In this paper, under a deterministic system setting, we assume that the energy harvesting times and harvested...
We explore an algorithmic approximation of achievable lower bounds for the generalized degrees of freedom on finite-field linear deterministic K-user interference channels. With a heuristic greedy algorithm, derived from results on the maximum independent set problem in graph theory, the max-min generalized degrees of freedom for desired links are approached. The idea of interference alignment is...
In this work the problem of non-cooperative resource optimization in the uplink of a relay-assisted MIMO MAC system with partial CSI at the transmitter is addressed. Each multiple access user pursues individual rate maximization, whereas the relay designs its amplify-and-forward matrix in order to optimize the system's sum-rate. From a game-theoretic perspective, the resource allocation process is...
In this paper, we present a practical and provably secure two-way wireless communication scheme in the presence of a passive eavesdropper. The scheme implements a randomized scheduling and power allocation mechanism, where each legitimate node transmits in random time slots and with random transmit power. Such randomization results in ambiguity at the eavesdropper with regard to the origin of each...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.