Cross-layer transmission rate/power policy for cognitive multi-access networks with imperfect sensing
We consider an underlay cognitive radio network with a primary user and a secondary user transmitting to a common receiver. The secondary user senses the primary user's channel to determine whether the primary user is active or idle. The secondary user's transmission policy is determined via a probabilistic cross-layer algorithm in which the secondary user's average packet delay is minimized subject to constraints on its average transmission power and the maximum probability of collision at the primary user. The proposed cross-layer algorithm determines the number of packets the secondary user
Software and Communications
Cross-layer minimum-delay scheduling and maximum-throughput resource allocation for multiuser cognitive networks
A cognitive network is considered that consists of a base station (BS) communicating with multiple primary and secondary users. Each secondary user can access only one of the orthogonal primary channels. A model is considered in which the primary users can tolerate a certain average delay. A special case is also considered in which the primary users do not suffer from any delay. A novel cross-layer scheme is proposed in which the BS performs successive interference cancellation and thus a secondary user can coexist with an active primary user without adversely affecting its transmission. A
Software and Communications
Demo: O'BTW - An opportunistic, similarity-based mobile recommendation system
[No abstract available]
Software and Communications
On the flow anonymity problem in network coding
In this paper, we aim at protecting the privacy of the communicating parties while ensuring the authenticity of source nodes. In particular, we exploit intra-flow network coding to preserve the anonymity of communicating parties. Towards this objective, we propose an anonymity preservation scheme, namely closed group anonymity (CGA) that preserves the anonymity of the communicating parties via mixing their flows. Afterwards, we explore an instance of the Authentication-Privacy Trade-off in the context of Network Coding. We analyze the trade-off with the aid of the proposed anonymity scheme and
Software and Communications
Low-complexity Kalman filter-based carrier frequency offset estimation and tracking for OFDM systems
In this paper, an iterative blind estimator for fractional carrier frequency offset (CFO) in orthogonal frequency division multiplexing (OFDM) systems is proposed. The estimator utilizes the null subcarriers transmitted at the edge of the spectrum and does not require any training. In addition, the proposed estimator does not require any prior knowledge of the frequency response of the channel. The problem is formulated using a state-space model, and an extended Kalman filter (EKF) is employed to estimate the CFO iteratively. Simulation results illustrate the enhanced ability of the proposed
Software and Communications
A cooperative Q-learning approach for online power allocation in femtocell networks
In this paper, we address the problem of distributed interference management of cognitive femtocells that share the same frequency range with macrocells using distributed multiagent Q-learning. We formulate and solve three problems representing three different Q-learning algorithms: namely, centralized, femto-based distributed and subcarrier-based distributed power control using Q-learning (CPC-Q, FBDPC-Q and SBDPCQ). CPC-Q, although not of practical interest, characterizes the global optimum. Each of FBDPC-Q and SBDPC-Q works in two different learning paradigms: Independent (IL) and
Software and Communications
DPSK receiver-sensitivity enhancement using an SOA in front of the receiver
A technique for DPSK receiver-sensitivity improvement is demonstrated using numerical simulations. It is based on reshaping and reamplifying of received 80 Gbit/s DPSK using an SOA before a one bit delay interferometer. The SOA re-amplifies data without adding amplitude or differential phase noise due to its gain-compression. The system is tested using 231-1 PRBS RZ-DPSK (NRZ-DPSK) loaded with both phase and amplitude noise. It shows 2dB (1.7dB) quality-factor improvement. The estimated BER by error-counting shows receiver-sensitivity improvement of ≅3dB in case of single-ended detection and
Software and Communications
The quest for user similarity in mobile societies
In this paper we explore the notion of mobile users' similarity as a key enabler of innovative applications hinging on opportunistic mobile encounters. In particular, we analyze the performance of known similarity metrics, applicable to our problem domain, as well as propose a novel temporal-based metric, in an attempt to quantify the inherently qualitative notion of similarity. Towards this objective, we first introduce generalized profile structures, beyond mere location, that aim to capture users interests and prior experiences, in the form of a probability distribution. Afterwards, we
Software and Communications
Degrees of freedom for a two-cell relay network with soft handoffs
In this paper we investigate the degrees of freedom of a cellular relay network that consists of two base stations, two mobile stations and four decode-and-forward relays. The base stations and the mobile stations are equipped with M antennas each, whereas the relays are equipped with N antennas each. In addition, each base station has an independent message to each mobile station. The relays are used to froward the messages from the base stations to the mobile station as there is no direct link. We consider three different relaying architectures where the two relays associated with each base
Software and Communications
Throughput maximization via adjusting packet size of a buffered cognitive radio user
In this paper, we investigate a cognitive scenario with one secondary user and one primary user. Users are assumed to be buffered terminals. Each user has certain arrival rate with certain packet size. We propose a scheme where the cognitive radio user (secondary user) may combine some of the arrived packets into a single larger packet or split each of them into smaller packets to increase its maximum mean stable arrival rate. We consider sensing errors and study two channel models; namely, collision channel model, where concurrent transmissions cause definite packets loss, and multi-packet