banner

Filter by

Achievable degrees of freedom on K-user MIMO multi-way relay channel with common and private messages

This paper investigates the achievable total degrees of freedom (DoF) of the MIMO multi-way relay channel that consists of K users, where each user is equipped with M antennas, and a decode-and-forward relay equipped with N antennas. In this channel, each user wants to convey K - 1 private messages to the other users in addition to a common message to all of them. Due to the absence of direct

Software and Communications

On optimizing cooperative cognitive user performance under primary QoS constraints

We study the problem of optimizing the performance of cognitive radio users with opportunistic real-Time applications subject to primary users quality-of-service (QoS) constraints. Two constrained optimization problems are formulated; the first problem is maximizing the secondary user throughput while the second problem is minimizing the secondary user average delay, subject to a common constraint

Software and Communications

Achievable degrees of freedom of the K-user MISO broadcast Channel with alternating CSIT via interference creation-resurrection

Channel state information at the transmitter affects the degrees of freedom of the wireless networks. In this paper, we analyze the DoF for the K-user multiple-input single-output (MISO) broadcast channel (BC) with synergistic alternating channel state information at the transmitter (CSIT). Specifically, the CSIT of each user alternates between three states, namely, perfect CSIT (P), delayed CSIT

Software and Communications

Using network coding to achieve the capacity of deterministic relay networks with relay messages

In this paper, we derive the capacity of the deterministic relay networks with relay messages. We consider a network that consists of five nodes, four of which can only communicate via the fifth one. However, the fifth node is not merely a relay as it may exchange private messages with the other network nodes. First, we develop an upper bound on the capacity region based on the notion of a single

Software and Communications

On the coexistence of a primary user with an energy harvesting secondary user: A case of cognitive cooperation

In this paper, we consider a cognitive scenario where an energy harvesting secondary user shares the spectrum with a primary user. The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues: a queue for storing its

Software and Communications

A proper throughput-leakage balance for downlink cellular networks

A novel transmission scheme is developed for the downlink frame of cellular networks. Each base station (BS) aims at iteratively balancing the throughput at the mobile stations (MSs) of its cell with the interference it causes at the MSs of the neighboring cells, requiring negligible coordination between the BSs. A simplified version of the scheme that neither requires iterations nor cooperation

Software and Communications

Sparse spectrum sensing in infrastructure-less cognitive radio networks via binary consensus algorithms

Compressive Sensing has been utilized in Cognitive Radio Networks (CRNs) to exploit the sparse nature of the occupation of the primary users. Also, distributed spectrum sensing has been proposed to tackle the wireless channel problems, like node or link failures, rather than the common 'centralized approach' for spectrum sensing. In this paper, we propose a distributed spectrum sensing framework

Software and Communications

Energy-Aware Cooperative Wireless Networks with Multiple Cognitive Users

In this paper, we study and analyze cooperative cognitive radio networks with arbitrary number of secondary users (SUs). Each SU is considered a prospective relay for the primary user (PU) besides having its own data transmission demand. We consider a multi-packet transmission framework that allows multiple SUs to transmit simultaneously because of dirty-paper coding. We propose power allocation

Software and Communications

Proactive location-based scheduling of delay-constrained traffic over fading channels

In this paper, proactive resource allocation based on user location for point-to-point communication over fading channels is introduced, whereby the source must transmit a packet when the user requests it within a deadline of a single time slot. We introduce a prediction model in which the source predicts the request arrival Tp slots ahead, where Tp denotes the prediction window (PW) size. The

Software and Communications

Stability Analysis of Slotted Aloha with Opportunistic RF Energy Harvesting

Energy harvesting (EH) is a promising technology for realizing energy-efficient wireless networks. In this paper, we utilize the ambient RF energy, particularly interference from neighboring transmissions, to replenish the batteries of the EH enabled nodes. However, RF energy harvesting imposes new challenges into the analysis of wireless networks. Our objective in this paper is to investigate the

Software and Communications