The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Active network synthesis is important for circuit designer to find new circuits with desired performance. In this paper, a method of Tow-Thomas (TT) Bi-quad band-pass filter circuit generation methods is proposed using nullor representation of the operational amplifier (OPA), and a method for synthesizing active band-stop filters is presented, both of which start from voltage transfer function and...
In this paper, we consider a beyond-5G scenario, where two types of users, denoted as scheduled and uncoordinated nodes, coexist on the same set of radio resources for sending data to a base station. Scheduled nodes rely solely on a centralized scheduler within the base station for the assignment of resources, while uncoordinated nodes use an unslotted Carrier Sense Multiple Access (CSMA) protocol...
In order to identify spectrum holes, secondary users (SUs) should detect whether the spectrum band is occupied by primary user (PU). Cooperative PU detection is the most prevalent PU detection method in cognitive radio (CR) networks. Existing cooperative PU detection usually consumes a dedicated reporting channel to share the detection results. This paper proposes a partial relay-based cooperative...
An asynchronous medium access control (MAC) duty-cycled protocols have higher energy efficiency and lower packet latency than synchronized ones due to reduced idle listening. Moreover, they provide efficient utilization of energy supplied to mobile sensors. They are considered very important in MAC protocols due to the adverse effects of hidden terminals which causes energy consumption in sensor networks...
To meet the requirements of 5G mobile networks, several radio access technologies, such as millimeter wave communications and massive MIMO, are being proposed. In addition, cloud radio access network (C-RAN) architectures are considered instrumental to fully exploit the capabilities of future 5G RANs. However, RAN centralization imposes stringent requirements on the transport network, which today...
The 5G wireless communication system supports varied applications, making the uplink/downlink traffic asymmetry more and more serious. Dynamic time division duplex (TDD) technique has become a key technology of 5G networks due to its flexibility to support asymmetric services. In this paper, we study dynamic TDD sub-frame reconfiguration algorithm based on shifting. Firstly, we define cell shifting...
This paper proposes the use of a transmitter based on a linear amplification with nonlinear components (LINC) architecture, in which the reconfigurable matching networks (RMNs) are included. By varying the RMN active cell number, it is possible to change the load impedance at the power amplifier (PA) output, improving the amplifier drain efficiency and therefore the efficiency of the whole system...
This editorial sums up relevant topics on the assessment of wireless communication systems covered by the especial issue entitled “Experimental Evaluation in Wireless Communications.” The topics include practical aspects on the implementation of distributed asynchronous non-linear kernel methods over wireless sensor networks; localization methods based on the exploitation of radio-frequency identification...
IEEE 802.11 wireless LAN is proliferating since the increased trend in the wireless network utilization on mobile devices. Accuracy, fast content delivery, and reliable mobility support are essential features of any network to support the changing trend in a wireless network. However, traditional architectures in wireless LAN (WLANs or WiFi) always endured from challenges such as the provision of...
Wireless sensor networks (WSNs) have been used extensively in a range of applications, which realizes data acquisition, processing, transmission, and analysis in an interesting area. Harsh surroundings and their inherent vulnerability often mean that these networks suffer from simultaneous node failure possibly causing the network to become partitioned into multiple disjointed segments. This in turn...
Benefiting from the high spectrum efficiency and power efficiency, 6PolSK-QPSK (6-ary polarization-shift keying quadrature phase-shift keying) is a promising modulation format in coherent optical communication. We proposed a novel structure to generate the 6PolSK-QPSK with two dual-drive MZMs. Simulation results show that the proposed structure can generate 6PolSK-QPSK effectively and the performance...
We solve a communication problem between a UAV and a set of receivers, in the presence of a jamming UAV, using differential game theory tools. We propose a new approach in which this kind of games can be approximated as pursuit-evasion games. The problem is posed in terms of optimizing capacity, and it is solved in two ways: firstly, a surrogate function approach is used to approximate it as a pursuit-evasion...
Wireless technology is emerging as a key technology for the future networks. Wireless mesh networks (WMNs) have emerged as an indispensable technology for deployment of wireless services for various applications in personal, enterprise, and metropolitan areas. Researchers are working actively in different fields of WMNs for providing better services. Routing protocols play a vital role in WMNs to...
An asynchronous time difference of arrival (ATDOA) positioning system requires no time synchronization among all the anchor and target nodes, which makes it highly practical and can be easily deployed. This paper first presents an ATDOA localization model, and then primarily focuses on two new localization algorithms for the system. The first algorithm is a two-step positioning algorithm that combines...
In future 5G communication system, radio resources can be effectively reused by cognitive radio networks (CRNs), where a lot of secondary users (SUs) are able to access the spectrum of primary users (PUs). In this paper, we analyze the optimal spectrum access and power control of SUs on multiple bands with the target of maximizing the average sum rate (ASR) of SUs. Specifically, based on the stochastic...
The collaborative relay network plays an important role in a smart grid application thanks to its high efficiency. However, energy and bandwidth management need to be further improved to extend network life cycle and reduce potential network segmentation. Aiming to balance the network energy consumption, this paper proposes an adaptive relay node selection algorithm based on the opportunity (OAR)...
Multiple-input multiple-output (MIMO) technologies have been shown to potentially improve the performance of network. Many traditional medium access control (MAC) protocols, such as spatial time division multiple access (STDMA), may not support MIMO technologies directly and not make full use of the feature of MIMO, which may be a limitation in the practical application in ad hoc networks. Therefore,...
A multicarrier signal can be synthesized thanks to a symbol sequence and a Gabor family (i.e., a regularly time–frequency shifted version of a generator pulse). In this article, we consider the case where the signaling density is increased such that inter-pulse interference is unavoidable.Over an additive white Gaussian noise channel, we show that the signal-to-interference-plus-noise ratio is maximized...
The cloud-computing paradigm has been driving the cloud-leveraged refactoring of existing information and communications technology services, including voice over IP (VoIP). In this paper, we design a prototype secure mobile VoIP (mVoIP) service with the open-source Asterisk private branch exchange (PBX) software, using Docker lightweight virtualization for mobile devices with the immutable concept...
Long-term evolution (LTE) is becoming the first choice of mobile network operators (MNOs) when constructing a wireless network infrastructure because of its high data rate, high throughput, and low latency. These significant advancements are necessary for satisfying the delivery of a wide-range of mobile applications and managed network resources. However, deploying a new LTE network or a transition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.