The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, we propose interference cancellation techniques and a multi-relay selection algorithm based on greedy methods for the uplink of cooperative direct-sequence code-division multiple access (DS-CDMA) systems. We first devise low-cost list-based successive interference cancellation (GL-SIC) and parallel interference cancellation (GL-PIC) algorithms with RAKE receivers as the front-end that...
In wireless cyber-physical systems (CPS), with a growing number of sensors being deployed, more and more data will be transmitted over wireless links. This essentially requires that wireless network protocols should be further studied and amended to improve their transmission efficiency. The delayed channel access (DCA) protocol is of great practical importance in improving channel utilization. DCA...
The capability of quality-of-service (QoS) provisioning is of particular importance for multi-hop wireless networks when the real-time applications boost in current days. The scheduling and delivery of data packets in a deficient method may probably cause network congestion, which will in turn decrease the capability of QoS provisioning in the network. To this end, we propose a joint QoS provisioning...
Vehicular ad hoc network (VANET) is a mobile ad hoc network with a dynamic property; the vehicles possess high mobility and undergo fast topology changes. This special type of mobile ad hoc network is a popular topic of research. Owing to the specific features of VANETs, unique routing protocols are required for short-range, high-speed communication among nearby vehicles. In this study, we propose...
The work focuses on the max link selection (MLS) schemes of buffer-aided relaying over the independent and non-identically distributed (i.ni.d) Nakagami-m fading channels in terms of outage probability, average packet delay, and improved diversity-delay trade-off schemes. By modeling the transition of buffer states as a Markov chain, we first obtain the outage probability and average packet delays...
Game theory is an innovative idea to understanding human behaviors from economics to political science. However, due to the bounded rationality of game players, game theory alone cannot fully explain human behavior and should complement other key concepts championed by the behavioral disciplines. This paper provides a foundation for decision-making process from the viewpoint of game theory and behavioral...
A wireless sensor network (WSN) is composed of a large number of tiny sensor nodes. Sensor nodes are very resource-constrained, since nodes are often battery-operated and energy is a scarce resource. In this paper, a resource-aware task scheduling (RATS) method is proposed with better performance/resource consumption trade-off in a WSN. Particularly, RATS exploits an adversarial bandit solver method...
This work deals with the analysis of energy efficiency (EE) issues of hybrid automatic repeat request (HARQ) protocols such as Chase combining (CC) and incremental redundancy (IR), in a LTE baseband-based half-division duplex relay-assisted network. The EE performance is highly dependent on delay and circuitry power consumption, i.e., baseband and radio-frequency (RF) parts, and the effects of these...
We introduce new polar coding schemes for independent non-identically distributed parallel binary discrete memoryless channels. The first scheme is developed for the case where underlying channels are time invariant (the case of a deterministic channel parameters), while the other schemes deal with a scenario where underlying channels change based on a distribution (the case of random channel parameters)...
In this work, we propose buffer-aided distributed space-time coding (DSTC) schemes and relay selection algorithms for cooperative direct-sequence code-division multiple access (DS-CDMA) systems. We first devise a relay pair selection algorithm that can exploit all possible relay pairs and then select the optimum set of relays among both the source-relay phase and the relay-destination phase according...
This paper proposes and evaluates the performance of multiuser (MU) triple-hop mixed radio frequency (RF)/free-space optical (FSO) relay network with generalized order user scheduling. An important example on the applicability of this scenario is in cellular networks where two sets of various users are communicating with their own base stations (BSs) over RF links and these BSs are connected together...
Digital Radio Mondiale (DRM) is the universally, openly standardized digital broadcasting system for all frequencies including LW, MW, and SW as well as VHF bands. Alongside providing high audio quality to listeners, DRM satisfies technological requirements posed by broadcasters, manufacturers and regulatory authorities and thus bears a great potential for the future of global radio. One of the key...
Analyzing coverage holes in mobile networks is still an important problem that needs to be addressed, mainly in Long-Term Evolution (LTE) networks, which have been recently deployed. However, each type of coverage hole has to be handled depending on the effect they have on the users. In particular, they are characterized by causing abnormal disconnections or inter-Radio Access Technology (RAT) handovers...
In recent years, the use of mobile devices including smartphones has increased significantly all over the world, and e-commerce using smartphones has also greatly increased. Furthermore, many people are using their smartphones to carry out certain aspects of their work according to the BYOD trend. Therefore, it is extremely important that mobile device users are authenticated securely by remote servers...
The primary task of RFID readers is to identify multiple objects as quickly and reliably as possible with minimal power consumption and computation. One issue addressed in this study is the manner in which RFID systems adopting the framed slotted ALOHA (FSA) protocol should be configured so that the minimum identification delay can be achieved with a preassigned confidence level. We first formalize...
Content dissemination over vehicular networks is a critical challenge due to its high intermittent connectivity. However, content cache and retrieval by exploiting the information-centric networking (ICN) paradigm did not get much attention. In this paper, in order to improve the efficiency of content retrieval, we propose a novel popularity-aware content caching and retrieving strategy in VANETs...
The present paper investigates monitoring of fatigue cracks of a metal structure using an eddy current micro sensor. Fatigue cracks tend to occur at bolt-jointed structures on an aircraft. In order to detect the damage quantitatively, a kind of change-prone micro eddy current sensor is designed and fabricated with flexible printed circuit board (FPCB) technology. A forward semi-analytical model is...
With the substantial progress in self-interference (SI) cancelation, the full-duplex (FD) technique, which allows the communication user to transmit and receive signals over the same frequency band simultaneously, enables a significant enhancement of spectral efficiency (SE) in comparison with the traditional half-duplex (HD) technique. Recently, relay-assisted device-to-device (D2D) communications...
Large-scale failures triggered by undesirable events such as natural disasters, massive power malfunction, and malicious attacks are attracting serious concerns in communication network infrastructure perspective. However, there have been few survivability strategy analyses in network mobility (NEMO) scenarios. To properly address this issue, this paper proposes two novel survivability strategies...
In this paper, we propose a three-dimensional (3D) beamforming scheme for the massive multiple-input multiple-output (MIMO) system where the base station (BS) employs a uniform rectangular array (URA). In order to avoid the high computational complexity involving large-dimensional channel matrices, a two-stage beamforming method is applied where the second-stage beamforming is a Kronecker product...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.