The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cache is becoming an effective method to improve the transmission rate and reduce the backhaul load. Nevertheless, owing to the limited capacity of backhaul, less power should be allocated to the users whose requested contents do not exist in the local caches to maximize the performance of the caching users. Thus, in this paper, power allocation (PA) is considered to further improve the performance...
Due to the unreliable nature of wireless links, sensor nodes frequently encounter degraded performance or lack of connection. This paper provides a real-time status monitoring and channel error diagnosis method in a wireless sensor network. It uses a poll and echo procedure to efficiently collect some physical layer and link layer statistics from both transmitter side and receiver side. A machine...
One of the key ingredients of Intelligent Transportation Systems (ITS) is delivery of broadcast status messages among vehicles for safety purposes. This requires an efficient Medium Access Control (MAC) that provides low average delay and high reliability. To this end, Carrier Sense Multiple Access (CSMA) has been commonly proposed for Vehicle Ad Hoc Networks (VANETs). Nevertheless, the hidden- node...
Pattern Division Multiple Access (PDMA) is a novel non-orthogonal multiple access scheme proposed to meet the demand of massive connection in the future 5G communications. PDMA is based on the joint design of transmitter and receiver. The multiuser signals are superposed on the multiple signal domains based on different characteristic patterns at the transmitter side, and the successive interference...
In this paper, pattern division multiple access with large-scale antenna array (LSA-PDMA) is proposed as a novel non-orthogonal multiple access (NOMA) scheme. In the proposed scheme, pattern is designed in both beam domain and power domain in a joint manner. At the transmitter, pattern mapping utilizes power allocation to improve the system sum rate and beam allocation to enhance the access connectivity...
Due to the large swath of available bandwidth, millimeter wave (mmWave) spectrum is potentially suitable to meet enhanced network capacity requirements of future generation communication systems. However, the high Analog to Digital Converter (ADC) sampling rate required to process wide band signals in the mmWave regime results in significant power consumption in the receiver hardware. In this work,...
Device to Device (D2D) communication with content caching has recently been proposed as an exciting and innovative technology for next generation cellular networks. This paper presents a novel content caching and delivery method which allows multiple devices caching the same content and the content being sent via multiple devices to single device (MDSD) communication using D2D links to enhance user...
To support tens of Giga-bits/second (Gbps) data rate, 5G mobile communication systems consider the integration of backhaul and fronthaul links into Xhaul networks. This paper introduces the system-level simulation for mmWave based mobile Xhaul networks. Network scenarios, hybrid beamforming, with large antenna elements, and link-level models are discussed based on the results of the system-level simulation...
The cellular data traffic has been dramatically increased, a typical approach is considering the operation of the Long Term Evolution (LTE) system in the unlicensed spectrum. Although there are a large number of theoretical researches on LTE-U, field trial results are still lacking. In this paper, we build a real time field trial in 5.8GHz unlicensed bands. The typical indoor scenario is deployed...
This paper considers a K-cell multiple access channel with inter-symbol interference (ISI). The primary finding of this paper is that, without instantaneous channel state information at a transmitter, the interference-free sum degrees of freedom of K is asymptotically achievable when the number of users per cell is sufficiently large, and also when the number of channel-impulse-response taps of desired...
We explore the performance of coded caching in a SISO BC setting where some users have higher link capacities than others. Focusing on a binary and fixed topological model where strong links have a fixed normalized capacity 1, and where weak links have reduced normalized capacity T < 1, we identify — as a function of the cache size and T — the optimal throughput performance, within a factor of...
In this paper, we consider precoder design for multiuser multiple-input-multiple-output (MIMO) Gaussian broadcast (BC) channels and propose a generalized zero-forcing (GZF) precoder based on successive dirty-paper coding (DPC), i.e., the GZF-DP precoder. The GZF-DP precoder is an extension of the GZF-DP precoder designed earlier for multi-input-single-output broadcast (MISO-BC) channels, and also...
This paper investigates the Gaussian state-dependent Z-interference channel (Z-IC), in which two receivers are corrupted respectively by two correlated states that are noncausally known to transmitters and unknown to receivers. Three interference regimes are studied, and the capacity region or sum capacity boundary is characterized either fully or partially under various channel parameters. The impact...
A dual-polarization passive bistatic radar is used to evaluate the potential benefit of cross-polarized measurements for the suppression of strong direct signal interference in the DVB-T band. The linear array antenna consists of 10 bowtie elements, 5 of which measuring horizontal and 5 vertical polarization. Two small GPS-equipped aircraft were used as targets, flying prescribed patterns. Two antenna...
We study the topological interference management problem with decoded message passing (TIM-MP) using a polyhedral approach. The TIM-MP problem considers partially-connected interference channels with no channel state information except for the network topology (i.e., connectivity graph) at the transmitters, while the decoded messages at the receivers can be routed to other receivers via backhaul links...
This work explores cache-aided interference management in the absence of channel state information at the transmitters (CSIT), focusing on the setting with K transmitter/receiver pairs endowed with caches, where each receiver k is connected to transmitter k via a direct link with normalized capacity 1, and to any other transmitter via a cross link with normalized capacity t ≤ 1. In this setting, we...
The optimality of the simple scheme of treating interference as noise (TIN) is studied in this paper for the 2 × M linear deterministic (LD) X-channel. A new capacity upper bound is derived. In the considered scheme (denoted as 2-IC-TIN), the setup is reduced to a 2-user interference channel while the receivers employ TIN. It is shown that as long as 2-IC-TIN is optimal in a M × 2 X-channel, it is...
Appearing on the stage quite recently, the Low Power Wide Area Networks (LPWANs) are currently getting much of attention. In the current paper we study the susceptibility of one LPWAN technology, namely LoRaWAN, to the inter-network interferences. By means of excessive empirical measurements employing the certified commercial transceivers, we characterize the effect of modulation coding schemes (known...
Dynamic spectrum sharing techniques applied in the UHF TV band have been developed to allow secondary WiFi transmission in areas with active TV users. This technique of dynamically controlling the exclusion zone enables vastly increasing secondary spectrum re-use, compared to the "TV white space" model where TV transmitters determine the exclusion zone and only "idle" channels...
The increasingly important role of Long Term Evolution (LTE) has increased security concerns among the service provider and end users and made security of the network even more indispensable. In this paper, the power control mechanism for LTE is explored. The unprotected power control signal together with the Cell Radio Network Temporary Identifier (CRNTI) can be exploited to trick the victim User...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.