The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Millimeter wave (mmWave) communication is a key enabling technology for 5G cellular systems. However, due to mmWave propagation characteristics, link length for very high rates is limited and will likely necessitate the use of relay nodes for longer-range ultra-high-speed backhaul communications. This paper investigates relay selection and scheduling to support high end-to-end throughput in mmWave...
Millimeter-wave communication in 60 GHz band is considered a promising technology to meet the explosive growth of data demand in Wi-Fi based WLAN. To address potential blockage for 60 GHz signals, multiple APs are proposed for such WLAN. This paper addresses the important problem of AP assignment and transmission scheduling for a multi-AP 60 GHz WLAN. We propose two AP assignment schemes with different...
In RFID systems, it is unavoidable that we read stray tags occasionally and it is critical that we can reliably filter out stray tag readings for accurate tracking. In this paper, we studied a set of features namely RSSI Euclidean distance (RED), number of reads Euclidean distance (NED) and time between reads Euclidean distance (TED) for classifying RFID reading into target and stray class membership...
The flight of unmanned aerial vehicle (UAV) is vulnerable to various disturbances and faults. In this paper, the small damage of the wing of an unmanned aerial vehicle is taken into consideration. The UAV control framework consists of force loop and torque loop, where the nonlinear disturbance observer (NDO) based dynamic inverse (DI) control and the extended state observer (ESO) based dynamic inverse...
In this paper, the system-level performance of nonorthogonal multiple access (NOMA) in coordinated direct and relay transmission (CDRT) is investigated. Considering a successive interference cancellation (SIC) receiver under the 3D channel model for LTE, the system-level performance of the NOMA-CDRT is compared to the NOMA in non-coordinated direct and relay transmission (nCDRT). Simulation results...
The integration of Device-to-Device (D2D) communication into a cellular network improves system spectral efficiency, increases capacity, reduces power consumption and also reduces traffic to the evolved NodeB (eNB). However, D2D communication generates interference to the conventional cellular network which deteriorates the system performance. In this paper, we propose a radio resource allocation...
Recently, Single-Cell Point-to-Multipoint (SC-PTM) has been studied in 3GPP as an agile broadcast/multicast mechanism. Due to cell-level support of the multicast service, SC-PTM can adjust the service area dynamically and its scheduling is quite agile. In the conventional SC-PTM, however, a single multicast transmission is set for the worst user and provided for all the users regardless of their channel...
This paper considers a frequency-division-duplexing (FDD) massive multiple-input multiple-output (MIMO) system that operates with two-stage beamforming based on user grouping. In this system, we propose a first stage beamformer and a user grouping method for the two-stage beamforming. The proposed first stage beamformer maximizes an approximate sum rate calculated from the second-order statistic of...
The explosive growth of wireless devices requires more aggressive and balanced spectrum sharing and the listen-before-talk (LBT) is still a superior candidate protocol for a high device density. The Modified hardcore point process (HCPP) type II model provides mathematically tractable performances for such LBT networks, but it underestimates the LBT performances. In this regard, this paper evaluates...
In our paper, a novel method is proposed to obtain the optimal positions of secondary base stations (SBSs) for cognitive radio Internet of Things (IoT) sensor networks and to select the optimal operating channel in order to maximize the secondary capacity, while also protecting the primary systems. We proposed an appearance probability matrix for secondary IoT sensor devices in order to maximize the...
This paper considers a relayed broadcast in IEEE 802.11 wireless local area (WLAN) networks. In the relayed broadcast, a source node intends to deliver data frames to many nodes beyond its coverage and all the nodes except the source node attempt to relay the received data frames in a contention-based and distributed manner. This traffic dissemination scheme, referred to as flooding, has several problems...
In this paper, we propose a novel pseudo-random beamforming (BF) technique in multi-cell downlink networks consisting of multiple base stations (BSs) and one BS coordinator. In the proposed technique, each BS first generates M BF matrices with a pseudo-random manner and each mobile station (MS) opportunistically feeds back the received signal-to-interference-and-noise (SINR) ratio for each random...
In order to reduce the traffic load in cellular network and improve the data rates for users located in an indoor environment the Femtocells are used to solve the poor indoor coverage problem. It represents a cost-effective solution compared to other solutions such as Picocells and distributed antenna systems. However, if the signal-to-noise ratio is high then UEs can receive good throughput. For...
In this paper, we investigate the resource allocation for the video streaming service in the cognitive radio network (CRN) based on orthogonal frequency division multiple access (OFDMA). Considering the channel estimation error between secondary transmitters (STx) and primary receivers (PRx), we address the probabilistic interference constraint model. With imperfect CSI between STx and secondary receivers...
In traditional physical interference model for Wireless Mesh Networks (WMNs) or wireless networks, a message transmitted by a node v to the intended node w within v′ transmission range can be successfully received at w if only if in this step w is listening and the interference power received at w due to simultaneous transmissions from other nodes within w′ interference range is less than the predefined...
Interference alignment (IA) is a prospective method to manage interference between users in multi-user networks. On the other hand, jamming can be an effective way to combat adversarial eavesdropping for legitimate networks. In this paper, a beneficial jamming scheme is proposed for interference alignment networks. In the scheme, the jammer utilizes its precoding vector to constrain the jamming signal...
For the specific propagation characteristics of millimeter wave, in this paper, we study the beamforming design and interference management in millimeter wave cellular networks with partial channel state information (CSI). Specifically, we propose two beamforming schemes, namely eigen beamforming and orthogonal beamforming, based on the information of channel covariance matrix, and analyze the intercell...
Inter-cell interference is one of important factors in drone small cells (DSCs). However, most works investigated the network performance of DSC networks with an assumption of interference-free. To achieve a realistic analysis, we analyze the coverage probability and achievable rate of DSC networks under inter-cell interference. However, the air-to-ground channel between DSCs and ground users consists...
Due to the open access nature of wireless communication environment, physical layer security has brought increasingly high attention in recent years, attempting to protect the confidential communication away from eavesdroppers. In contrast to the current secrecy designs, which generally exploit the spatial Degree-of-Freedom (DoF) (e.g. MIMO and cooperative relay approaches) or the temporal DoF (e...
The applications for MANETs have increased rapidly and today MANETs are capable of providing a variety of services. One of the major contributing factors is the availability of radios that are able to adapt to the channel conditions and can transmit at multiple data rates. A common approach for channel access is to employ a CSMA/CA based mechanism. However, these protocols tend to under perform at...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.