The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The most popular methods for the analysis of LDPC codes, e.g. density evolution and EXIT charts, apply to infinite length ensembles. Finite length analysis is less common, among the notable examples are scaling law analysis and the EXIT band chart. The scaling law is limited to the waterfall region and furthermore is limited to the final error rates and does not give insight into the progression and...
Content dissemination, in particular small-volume popular content dissemination, represents a killer application of vehicular networks, which is also fundamental to the delivery of advanced infotainment applications, such as vehicular social networks, road traffic alerts, etc. The content dissemination in vehicular networks relies on moving vehicles to relay and propagate contents. Due to challenges...
In this work, we consider a wireless powered communication network (WPCN) with an energy harvesting (EH) jammer where an eavesdropper tries to wiretap the communication between a user and a hybrid access-point (H-AP). In our system, the H-AP first transmits an energy signal to recharge the batteries of the EH user and the EH jammer in the energy transfer (ET) phase. Then, in the subsequent information...
It is predicted that the global mobile data traffic will increase nearly eightfold in the next five years, and the cloud applications will consist of 90 percent of total mobile data traffic by the end of 2019. There is no doubt that the increasing high quality video requirements and huge similar information stored in cloud servers enforce to setup a new communication paradigm. In this paper, we will...
Cognitive radio is an optimistic technology to implement the concept of dynamic spectrum access and provide a flexible way to share the spectrum among the primary and secondary users. In this paper, a game theoretic-based model is presented using the concept of Nash Equilibrium for spectrum sharing. In this model, interference and number of radios on each link are considered as parameters for designing...
We propose a Coordinated Non-Orthogonal Multiple Access (CO-NOMA) scheme for resource allocation in the context of mobile networks. NOMA refers to schemes where multiple users can access the wireless channel in the same frequency band simultaneously. In this study, we consider NOMA with power domain multiplexing, where the near- far property in space is exploited through appropriate power allocations...
In this paper we consider a constant envelope pilot signal based carrier frequency offset (CFO) estimation in massive multiple-input multiple-output (MIMO) systems. The proposed algorithm performs spatial averaging on the periodogram of the received pilots across the base station (BS) antennas. Our study reveals that the proposed algorithm has complexity only linear in (the number of BS antennas)...
Great efforts have been driven to improve the optimal decision for network selection, which is significant for vertical handover to meet user's rapidly increased requirements. Unfortunately, the instability of the basic decisive parameters is usually ignored, resulting in a high misjudgement ratio. Therefore, this paper proposed a novel parameter estimation algorithm to bridge the observed values...
Security is critical for wireless sensor networks (WSN)deployed in hostile environments since many types of attacks could reduce the trust on the global functioning of any WSN. Many solutions have been proposed to secure communications for WSNs and most of them rely on a centralized component which behaves as a certificate authority. We propose in this paper a distributed solution able to ensure authentication...
Wireless sensor networks (WSNs) are widely considered as the most important information gathering platform in enabling Internet of Things (IoT). In order to evolve the traditional WSNs for low-power and low-loss IoT applications, time slotted channel hopping (TSCH) MAC protocol has been proposed to tackle the single channel and inefficient medium access drawbacks through improved network topology...
This paper considers interference mitigation techniques in the forward link of multibeam satellite systems. In contrast to previous works, either devoted to receiver interference mitigation (e.g. multiuser detection) or transmitter interference mitigation (precoding), this work evaluates the achievable rates of the joint combination of both techniques. On the one hand, precoding cannot properly mitigate...
Abstract-We explore the physical-layer security for a multisource multi-relay wireless network in the presence of an eavesdropper, in which one of multiple sources is scheduled to send its message to a destination with the assistance of multiple decode-and-forward (DF) relays. One eavesdropper is considered at the receiver side, and assumed to be capable of overhearing the transmission from relays...
In recent years, the capacity and charging speed of batteries have become the bottleneck of mobile communications systems. With the development of wireless power transfer technologies, simultaneous wireless information and power transfer (SWIPT) becomes a possible alternative. Due to the limitations of practical circuit implementation, the energy harvesting circuit cannot directly decode the information...
In this paper q-ary Raptor codes under ML decoding are considered. An upper bound on the probability of decoding failure is derived using the weight enumerator of the outer code, or its expected weight enumerator if the outer code is drawn randomly from some ensemble of codes. The bound is shown to be tight by means of simulations. This bound provides a new insight into Raptor codes since it shows...
Abstract-Unlicensed LTE system holds high potential to effectively offload data/video traffic from the crowded licensed band. Previous effort of deploying LTE in the unlicensed band (e.g. license-assisted access LAA) relies on one or more LTE carriers in the licensed band, and may not be desired in certain scenarios. This paper studies a new technology of utilizing LTE directly in an unlicensed band,...
In this paper, the power allocation (PA) problem is investigated in cognitive radio networks (CRNs), employing non-orthogonal multiple access (NOMA) technique. In such a framework, the quality of service (QoS) requirements for both the primary users (PUs) and secondary users (SUs) should be met. We propose a novel PA algorithm, which fully exploits the characteristics of NOMA-based system. The QoS...
Two new non-data-aided (NDA) signal-to-noise ratio (SNR) estimators for multiple antenna systems are presented. The proposed estimators rely on higher- order moments of the received signal and employ the time-diversity of the fading channel. While one requires a priori knowledge about the number of transmit antennas, the other estimates the SNR without such knowledge. The performance of the proposed...
Modern mobile terminals produce massive small data packets. For these short-length packets, it is inefficient to follow the current multiple access schemes to allocate transmission resources due to heavy signaling overhead. We propose a many-access scheme that is well suited for the future communication systems equipped with many receive antennas. The system is modeled as having a block-sparsity pattern...
This paper jointly optimizes the precoding matrices and the set of active remote radio heads (RRHs) to minimize the network power consumption for a cloud radio access network (C-RAN) where both the RRHs and users all have multiple antennas. Both users' rate requirements and per-RRH power constraints are considered. Due to these conflicting constraints, this optimization problem may be infeasible....
Under the real-time electricity pricing environment in smart grid, building owners are faced with the indoor temperature control problem to minimize the daily electricity cost. Taking the heating scenario as an example, an intuitive strategy is to maintain the building's indoor temperature always at the lower bound of the predetermined comfort range. However, this strategy may not always achieve the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.