The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We generally emphasize that the zeroforcing (ZF) technique backed by an appropriate medium access control (MAC) protocol can be used to address the inevitable hidden terminal (HT) problem in multi-user multiple input multiple output (MU-MIMO) wireless local area network (WLAN) settings. However, to address the implementation-specific requirements of MU-MIMO WLANs, such as fairness in client access...
Recent years, information spreading under the environment of wireless communication has attracted increasing interest. Microblog platform on mobile terminals, as one product of wireless communication, facilitate information spreading and evolution by conveying message from peer to peer. Furthermore, sentiments from microblog reflect the attitude of peers on goods or events. Analysis of the sentiment...
Sensor networks are often part of a cyber-physical system. A large-scale sensor network often involves big data collection and data fusion. The agent technology has drawn much attention in wireless sensor networks (WSNs) to perform data fusion and energy balancing. Existing multi-agent itinerary algorithms are either time-consuming or too complicated in practice. In this paper, we design a routing...
An indoor localization method using multiple input, multiple output orthogonal frequency division multiplexing (MIMO-OFDM) channel state information (CSI) is proposed as a method that can be implemented on wireless local area networks of a current standard without affecting their protocol structures and that does not require a training process for adaptation to indoor environments. In the proposed...
The sleeping cell problem is one of the most critical issues for cellular deployments, consisting in the outage of a cellular station, which, conversely, works properly from the point of view of the monitoring system. This problem is often not detectable by the operators, and it could lead to severe degradations in the service provision in the long term. This issue has been commonly managed by the...
In order to improve the quality of multimedia communication and mobile users, the work efficiency of the cloud platform, the service-oriented mobile multimedia cooperative storing, and the delivery scheme were proposed based on opportunistic cloud coding and content-centric cloud compression. Firstly, according to the video frame and the multimedia content centric, the multimedia data compression...
In vehicular cyber-physical system (VCPS), beaconing mechanism is commonly deployed for the solar-powered roadside infrastructure to detect available passing-by vehicles for data dissemination. The traditional beaconing mechanism would cause a higher energy consumption due to the periodical beaconing procedure. To tackle this problem, we propose a new data dissemination strategy for roadside infrastructures...
In wireless body area sensor networks (WBASNs), energy efficiency is an area of extreme significance. At first, we present a mathematical model for a non-invasive inductive link which is used to recharge the battery of an implanted biomedical device (pacemaker). Afterwards, we propose a distance-aware relaying energy-efficient (DARE) and mutual information-based DARE (MI-DARE) routing protocols for...
We consider the strategic behavior of secondary users (SUs) in a cognitive radio system where SUs opportunistically share a single primary user (PU) band over a coverage area. The service of an SU can be interrupted by a PU in a preemptive manner, and the interrupted SU may abandon the system or wait until the PU band is sensed available. In the latter case, if spectrum sensing errors occur, they...
This paper studies robust transmit design for secure AF relay networks with imperfect channel state information (CSI). Two CSI error models, deterministically bounded error model and stochastic error model, are considered. In order to use the power at relays more efficiently, a joint cooperative relaying and jamming scheme is considered, where relays cooperate to forward the source signal and simultaneously...
This paper considers spectrum utilization, the probability of detection in cognitive radio (CR) model based on cooperative spectrum sensing with both simultaneous adaptive sensing and transmission at a transmitting secondary user (TSU), and the bit error rate (BER) detection with variation checking at a receiving user (RSU). In this paper, a novel detecting model is proposed in the being considered...
In this paper, a novel scheme is proposed to enhance the spectral efficiency of a two-way cooperative relaying system, where two source terminals exchange information directly and via K intermediate relays using the three-phase two-way decode-and-forward (DF) protocol. Signal space diversity (SSD) is incorporated into the two-way cooperative relaying system in the proposed scheme that exploits the...
We investigate a method to set the maximum allowable transmit power for a secondary base station in dynamic spectrum sharing among secondary users and primary users. In conventional methods, location information is assumed. Thus, the maximum allowable transmit power can be set by considering the shadowing between the secondary base station and the primary user receivers to satisfy a constraint. Specifically,...
Standard condition number (SCN) detector is an efficient detector in multi-dimensional cognitive radio systems since no a priori knowledge is needed. The earlier studies usually assume a large number of dimensions and a large number of samples per dimension and use random matrix theory (RMT) to derive asymptotic distributions of the SCN metric. In practice, the number of dimensions may not be large...
Future wireless communication systems are demanding a more flexible physical layer. GFDM is a block filtered multicarrier modulation scheme proposed to add multiple degrees of freedom and to cover other waveforms in a single framework. In this paper, GFDM modulation and demodulation is presented as a frequency-domain circular convolution, allowing for a reduction of the implementation complexity when...
5G-Cloud-VMesh network (5CVN) is nascent as an economical alternative for building federated and community networks. In 5G milieu, the Aggregator Node B (ANB) is the base station with enhanced computing capabilities and storage space. In this paper, an integration of 5G-cloud-VMesh network is initiated. In this paper, we also propose a new routing algorithm for 5CVN, dubbed as 5CVN-adroit algorithm...
Developments of wireless body area networks (WBANs) facilitate the pervasive health monitoring with mHealth applications. WBANs can support continuous health monitoring for the human body in convenience and high efficiency without any intervention. The monitoring data in health care have the characteristics of various data flows and heterogeneous data arrival rates, the transmission of which must...
Power control (PC) is a key solution to enable spectrum sharing between secondary users (SUs) and primary users (PUs). However, previous research lacks sensing uncertainties for the status of PUs. In this article, we focus on the PC problem for a cognitive relay network under the spectrum sensing uncertainties to minimize the total bit error rate (BER) of SUs under the constraints of maximum transmit...
A time domain sub-sampling technique that can be applied to wired or wireless orthogonal frequency division multiplexing systems is described in this paper. Focus is given on the specific conditions that allow optimal sparse information recovery. The advantage of the proposed method is that it can be implemented with very low complexity hardware, since it is based on deterministic non-iterative operations...
This paper considers an uplink multiuser hybrid beamforming system where a base station (BS) communicates with multiple users simultaneously. The performance of the uplink multiuser hybrid beamforming system depends on the effective channel which is given by the product of channel matrix and the analog beams. Therefore, to maximize the performance, we need to acquire information of the channels and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.