The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate the secrecy performance of an underlay cognitive decode-and- forward relay network (CDRN) by exploiting an active direct link in the presence of primary user's (PU's) interference. Herein, a secondary user (SU) transmitter strives to maintain a secure communication link with a legitimate SU receiver in presence of a passive eavesdropper. On account of system's viability,...
This paper studies a two-user single-input single- output (SISO) interference channel with a cognitive relay (ICCR) under delayed feedback. We consider three types of feedback: delayed channel state information at transmitter (CSIT), delayed output feedback, and no feedback. For each feedback information, we derive the optimal degrees of freedom (DoF) region of the two-user ICCR where delayed feedback...
In this paper, we propose an enhanced universal filtered orthogonal frequency division multiplexing (eUF- OFDM) to achieve low out-of-band emission (OOBE) while maintaining high communication quality under the long-delay multipath fading environment by combinedly using a cyclic prefix (CP) and a filter with short-transition time. The proposed eUF- OFDM can suppress the OOBE at channel-edge by 25 dB...
In this paper, we study the cache-aided cloud radio access network (C-RAN) with wireless fronthaul, where multiple cache-enabled users are served by multiple cache-enabled transmitters that are connected to a cloud processor through a wireless fronthaul link. We put forth a caching-and-delivery scheme that combines network-coded fronthaul transmission with cache-aided interference management. By broadcasting...
The feasibility of Forward Scatter Radar (FSR) that exploits pulsars as transmission sources for the purpose of air targets detection is examined. We theoretically calculated the power budget for air target detection using such a FSR system with the higher-gain radio telescopes used as receivers. The numerical results are obtained for three known radio telescopes and three pulsars.
Compared with today’s 4G wireless communication network, the next generation of wireless system should be able to provide a wider range of services with different QoS requirements. One emerging new service is to exploit cooperative driving to actively avoid accidents and improve traffic efficiency. A key challenge for cooperative driving is on vehicle-to-vehicle (V2V) communication which requires...
A multi-mode WPAN transceiver implemented in an SoC is presented. Fabricated in 40-nm CMOS, the chip supports IEEE 802.15.4 and all modes of Bluetooth. Consuming 7.8 mW from a 1.2-V supply, the receiver has a sensitivity of −104, −98, −95/−94/−88 dBm in 802.15.4, BLE and Bluetooth BDR/EDR2/EDR3, respectively. The transmitter has a power consumption of 10 mW to deliver 0 dBm output in the constant...
In this work, we study the value of cooperative transmission in wireless networks if no channel state information is available at the transmitters (no CSIT). Our focus is on large locally connected networks, where each transmitter is connected to the receiver that has the same index as well as L succeeding receivers. The cases of L = 1 and L = 2 represent Wyner's asymmetric and symmetric network models,...
Wireless Power Transfer (WPT) technology offers unprecedented opportunities to future cellular systems, making it possible to wirelessly recharge the mobile terminals as they get sufficiently close to the Base Stations (BSs). Here, we investigate the tradeoffs involved in the recharging process as multiple mobile users move across the cellular network, by systematically measuring the charging efficiency...
A low-power multi-standard transceiver in CMOS 28 nm is presented. The transceiver can be configured to cover the range from 5 Gbps to 28.2 Gbps. Both transmitter and receiver use a supply of 0.92 V. Transmitter uses a 3-tap Finite Impulse Response (FIR) filter and receiver uses a 3-tap analog FIR and 2-tap unrolled Decision Feedback Equalizer (DFE). The entire transceiver uses single level 0.92 V...
In this paper we present a chip-set of 4 wideband SiGe BiCMOS transceivers optimized for the stringent specifications of various microwave links in the 5–44 GHz range. Each receiver and transmitter covers full frequency bands of 5.6–8.5 GHz, 10–15.5 GHz, 17.5–26.5 GHz and 27–43.5 GHz and demonstrates high dynamic range and excellent noise figure and linearity. Radio links demonstrate error-free operation...
Understanding user-induced effects on signal reception across multiple frequency bands is of great scientific and military importance to the wireless industry. Various on-body locations and directional heading of the user are believed to impact the performance of mobile devices, but there has been little work across multiple frequency bands to quantify these user-induced effects. In this work, we...
Understanding user-induced effects on signal reception across multiple frequency bands is of great scientific and military importance to the wireless industry. Various on-body locations and directional heading of the user are believed to impact the performance of mobile devices, but there has been little work across multiple frequency bands to quantify these user-induced effects. In this work, we...
Wireless devices are ubiquitous nowadays and, since most of them use the same unlicensed frequency bands, the high number of packet losses due to interference and collisions degrade performance. Reliability, energy consumption, and latency are key challenges for future dense networks. Allowing the transmitter to take action, i.e., vacating the channel, as soon as a collision or interference is detected...
This paper presents a method for designing linear-phase square-root (SR) FIR digital filters that alleviate the effect of receiver timing uncertainty by the quadratically constrained quadratic programming. As in the previous work, we take the “roughness” of the hybrid analog/FIR-SR filter impulse response as the cost function and the filter's stopband attenuation and the system's tolerable ISI as...
Lightweight control planes are techniques that create a control plane in WiFi networks without any additional spectrum requirements. Flash signals are an example of such control signals that exploit the link margin that typically exists in WiFi communication. In this paper we consider the problem of allowing transmitters and receivers of a transmission to exploit such control channels while the communication...
This paper presents a wirelessly powered, fully-integrated, low-power full-duplex transceiver to support high-density and bidirectional neural implants. The transmitter (TX) uses impulse radio ultra-wide band based on an edge combining approach, and the receiver (RX) uses a 2.4-GHz on-off keying narrow band topology. The proposed transceiver provides dual band 500-Mbps TX uplink data rate and 100...
In this paper, we investigate physical-layer security in a wireless ad hoc network in which a large number of legitimate transmitter-receiver pairs coexist with randomly distributed eavesdroppers; each legitimate receiver works in either half-duplex (HD) or full-duplex (FD) mode. We aim to increase the number of secure links per unit area in the network of interest by determining the allocation between...
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselves...
In this paper, we accurately model the hardware impairments (HWI) as improper Gaussian signaling (IGS) which can characterize the asymmetric characteristics of different HWI sources. The proposed model encourages us to adopt IGS scheme for transmitted signal that represents a general study compared with the conventional scheme, proper Gaussian signaling (PGS). First, we express the achievable rate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.