The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio energy harvesting model is an another method to extend the lifetime of wireless networks. In this paper, an energy harvesting model is given for amply-and-forward relay networks with aiding of ambient interferences. For this reason, the energy constrained relays harvest energy from the received signal and then use that harvested energy to amply and send that signal to the target. A time switching...
In this paper, the secrecy performance of full-duplex jamming SWIPT system is conducted where multiple eavesdroppers intercept the confidential information individually. The closed-form expressions of the connection outage probability (COP), the secrecy outage probability (SOP), the reliable-secure probability (RSP) and the secrecy throughput are obtained, which depict the secrecy performance of the...
This paper proposes a new spectrum access algorithm based on the Partially Observable Markov Decision Process (POMDP) for Cognitive Radio Networks (CRNs). The proposed algorithm uses the Maximum Likelihood to estimate the licensed channel state transition probabilities based on historical statistics information of the channels. Then, the number of channels sensed by the secondary users in each time...
This paper proposes a novel design for linear precoder in underlay Device-to-Device (D2D) communication using cellular network, specifically for a use case with vehicle-to-vehicle communication and platooning. To increase the communication reliability, we develop an optimization algorithm for precoder that takes into account the outage probability when channel state information (CSI) is only partially...
In this paper, throughput of hybrid automatic repeat request (HARQ) schemes with finite blocklength codes is studied for both constant-rate and ON-OFF discrete-time Markov arrivals under statistical queuing constraints and deadline limits. After analyzing the decoding error probability and outage probability, the distribution of transmission period is characterized, and the throughput expressions...
In this paper we characterize the radio frequency (RF) spectrum opportunities available in a common GSM (Global System for Mobile Communications) channel to support the operation of a cognitive radio network (CRN). In a first step, we describe the technical details involved to sample the channel using a Software Defined Radio (SDR) device. Adopting a simple Energy-based detector, we identify the two...
In this paper, we introduce a generalized analytical framework to evaluate the coverage probability in an mmWave heterogeneous cellular network (HetNet) consisting of UHF macrocell base stations (BSs) and mmWave small cell BSs deployed in an urban area. A generalized user association scheme that can cover a few user association schemes is formulated and applied in the mmWave HetNet. Two important...
A decode-and-forward (DF) relaying wireless energy harvesting network, where the energy constrained relay uses the energy harvested from radio-frequency (RF) signals to forward data is considered in this paper. The relay collects energy and data through using time switching-based relaying (TSR) mechanism. For the delay-limited transmission mode, the outage probability is theoretically studied and...
Modeling of Distributed Denial of Service (DDoS) attacks is a multidimensional problem as different resources are used at the same time. Existing DDoS attacks models analyze usage of only one resource as most attack relay on exhausting one specific resource. However intersection of legal user flaw and attacks or multiple attacks' flows requires a composite view to the problem. In this paper we present...
Compared with conventional cognitive radio networks (CRNs), the efficiency can be improved if secondary users (SUs) have full duplex (FD) communication capabilities. We discuss FD spectrum sensing in non-time-slotted CRNs and study two work modes of SUs, transmitting-sensing (TS) mode and transmitting-receiving (TR) mode. SUs work alternately in two modes. In such a context, we analyze the sensing...
There have been burning issues on Wireless Body Area Networks (WBANs) in which performance analysis for media access layer (MAC) protocol is essential and has been discussed in many literatures. By using Markov chain model, saturation and non-saturation conditions, many works can calculate access probability and throughput of system. However, previous works usually assumed that channel is ideal and...
In this paper, the achievable rate of buffer-aided diamond relay systems under delay constraints is studied. The effective capacity, characterizing the maximum constant arrival rate to the source while satisfying the end-to-end delay constraints, is obtained for fixed decode-and-forward (DF) relaying schemes and selective relaying protocols. A selection relaying policy that maximizes the delay exponent...
In recent years, a significant amount of research has been conducted to explore the benefits of network coding in different scenarios, from both theoretical and simulation perspectives. In this paper, we utilize queueing theory to propose an analytical framework for bidirectional unicast flows in multi-hop wireless mesh networks, and study throughput of inter-flow network coding. We analytically determine...
The rapid growth of modern wireless applications results in spectrum and energy scarcity. Cognitive radio (CR) technology is pivotal to resolve spectrum shortage. However, energy consumption is a critical issue in CR networks (CRNs) due to the unique functionality of spectrum sensing. Besides RF energy harvesting has come up as a potential solution to provide energy to CR devices. In this paper, we...
We study in this work user impatience by adopting a realistic realization: a user gets impatient when its throughput falls below a certain threshold for a given patience duration. We model such a behavior in a cellular network, transporting elastic flows, for a realistic user configuration with random arrivals, following a Poisson process, and departure after a finite duration, either upon transfer...
Secondary User (SU) has a responsibility to seek opportunities of spectrum access through spectrum sensing continuously. Spectrum sensing is a main task in Cognitive Radio (CR) that must be performed to avoid collision with Primary User (PU) and having seamlessly data transmission via license channel. To achieve sensing outcome correctly with tolerable error rate, SU requires sufficient time for sensing...
The required time for spectrum sensing is critical issue in cognitive radio (CR). Secondary User (SU) must sense license spectrum to seek opportunities as quick as possible. However, quick sensing decreases the fidelity of sensing outcome. Sensing time has a significant impact to the throughput performance. This paper studies the impact of sensing time to the throughput performance at low signal to...
One of the approaches in cognitive radio is the opportunistic spectrum access (OSA), which enables secondary users (SUs) to access the licensed frequency bands that are detected to be idle. Though there have been a few updates on the throughput aspects of SUs in OSA not much work has been done taking into account the sensing errors, spectrum occupancy probabilities as well as the transmission frame...
In this paper, we study the impact of eigenvalue-based spectrum sensing techniques in the achievable throughput of the secondary cognitive radio network. For this analysis, the channel between the primary and secondary users is modeled as a complex Nakagami-m distribution, in order to investigate the effects of not only the channel envelope, but also the novel non-uniform phase distribution in the...
Recently in cooperative spectrum sensing, there are many researches on designing strategies for the optimization of the length of the sensing time (as a part of the total frame length) while fulfilling the objective of achieving certain level of protection of primary users. The performance of cooperative spectrum sensing scheme is greatly affected by the length of the sensing time selected or calculated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.