about.jpg

Cross-layer transmission rate/power policy for cognitive multi-access networks with imperfect sensing

We consider an underlay cognitive radio network with a primary user and a secondary user transmitting to a common receiver. The secondary user senses the primary user's channel to determine whether the primary user is active or idle. The secondary user's transmission policy is determined via a probabilistic cross-layer algorithm in which the secondary user's average packet delay is minimized subject to constraints on its average transmission power and the maximum probability of collision at the primary user. The proposed cross-layer algorithm determines the number of packets the secondary user

Software and Communications

Cross-layer minimum-delay scheduling and maximum-throughput resource allocation for multiuser cognitive networks

A cognitive network is considered that consists of a base station (BS) communicating with multiple primary and secondary users. Each secondary user can access only one of the orthogonal primary channels. A model is considered in which the primary users can tolerate a certain average delay. A special case is also considered in which the primary users do not suffer from any delay. A novel cross-layer scheme is proposed in which the BS performs successive interference cancellation and thus a secondary user can coexist with an active primary user without adversely affecting its transmission. A

Software and Communications

Demo: O'BTW - An opportunistic, similarity-based mobile recommendation system

[No abstract available]

Software and Communications

On the flow anonymity problem in network coding

In this paper, we aim at protecting the privacy of the communicating parties while ensuring the authenticity of source nodes. In particular, we exploit intra-flow network coding to preserve the anonymity of communicating parties. Towards this objective, we propose an anonymity preservation scheme, namely closed group anonymity (CGA) that preserves the anonymity of the communicating parties via mixing their flows. Afterwards, we explore an instance of the Authentication-Privacy Trade-off in the context of Network Coding. We analyze the trade-off with the aid of the proposed anonymity scheme and

Software and Communications

Low-complexity Kalman filter-based carrier frequency offset estimation and tracking for OFDM systems

In this paper, an iterative blind estimator for fractional carrier frequency offset (CFO) in orthogonal frequency division multiplexing (OFDM) systems is proposed. The estimator utilizes the null subcarriers transmitted at the edge of the spectrum and does not require any training. In addition, the proposed estimator does not require any prior knowledge of the frequency response of the channel. The problem is formulated using a state-space model, and an extended Kalman filter (EKF) is employed to estimate the CFO iteratively. Simulation results illustrate the enhanced ability of the proposed

Software and Communications

A cooperative Q-learning approach for online power allocation in femtocell networks

In this paper, we address the problem of distributed interference management of cognitive femtocells that share the same frequency range with macrocells using distributed multiagent Q-learning. We formulate and solve three problems representing three different Q-learning algorithms: namely, centralized, femto-based distributed and subcarrier-based distributed power control using Q-learning (CPC-Q, FBDPC-Q and SBDPCQ). CPC-Q, although not of practical interest, characterizes the global optimum. Each of FBDPC-Q and SBDPC-Q works in two different learning paradigms: Independent (IL) and

Software and Communications

DPSK receiver-sensitivity enhancement using an SOA in front of the receiver

A technique for DPSK receiver-sensitivity improvement is demonstrated using numerical simulations. It is based on reshaping and reamplifying of received 80 Gbit/s DPSK using an SOA before a one bit delay interferometer. The SOA re-amplifies data without adding amplitude or differential phase noise due to its gain-compression. The system is tested using 231-1 PRBS RZ-DPSK (NRZ-DPSK) loaded with both phase and amplitude noise. It shows 2dB (1.7dB) quality-factor improvement. The estimated BER by error-counting shows receiver-sensitivity improvement of ≅3dB in case of single-ended detection and

Software and Communications

The quest for user similarity in mobile societies

In this paper we explore the notion of mobile users' similarity as a key enabler of innovative applications hinging on opportunistic mobile encounters. In particular, we analyze the performance of known similarity metrics, applicable to our problem domain, as well as propose a novel temporal-based metric, in an attempt to quantify the inherently qualitative notion of similarity. Towards this objective, we first introduce generalized profile structures, beyond mere location, that aim to capture users interests and prior experiences, in the form of a probability distribution. Afterwards, we

Software and Communications

Degrees of freedom for a two-cell relay network with soft handoffs

In this paper we investigate the degrees of freedom of a cellular relay network that consists of two base stations, two mobile stations and four decode-and-forward relays. The base stations and the mobile stations are equipped with M antennas each, whereas the relays are equipped with N antennas each. In addition, each base station has an independent message to each mobile station. The relays are used to froward the messages from the base stations to the mobile station as there is no direct link. We consider three different relaying architectures where the two relays associated with each base

Software and Communications

Throughput maximization via adjusting packet size of a buffered cognitive radio user

In this paper, we investigate a cognitive scenario with one secondary user and one primary user. Users are assumed to be buffered terminals. Each user has certain arrival rate with certain packet size. We propose a scheme where the cognitive radio user (secondary user) may combine some of the arrived packets into a single larger packet or split each of them into smaller packets to increase its maximum mean stable arrival rate. We consider sensing errors and study two channel models; namely, collision channel model, where concurrent transmissions cause definite packets loss, and multi-packet

Software and Communications