In this paper, we investigate the impact of cooperation between a secondary transmitter-receiver pair and a primary transmitter on the maximum stable throughput of the primary-secondary network. Each transmitter, either primary or secondary, has a buffer for storing its own traffic. In addition to its own buffer, the secondary transmitter has a buffer for storing a fraction of the undelivered primary packets due to channel impairments. Moreover, the secondary destination has a relaying queue (buffer) for storing a fraction of the undelivered primary packets. In our proposed cooperative system
Internet of Things (IoT) is considered as a trend nowadays. Devices connected to the internet interact with surrounding; this poses strong challenges in handling big data with a certain level of security. In this paper IoT devices will be divided in to two categories high vulnerability devices and low vulnerability devices. The classification depends on the ease of attacks. In order to ensure the security of IoT devices, an agile approach is used to secure high vulnerability devices as first step and then low vulnerability devices by applying encryption algorithms. © 2018 IEEE.
The rapid growth of vehicle demand, such as information sharing, entertainment, and multimedia contents, overwhelms the back-haul network. Due to this nature of the network that suffers from high link disconnections and limited resources, it is challenging to develop a new strategy to satisfy users' requirements. Proactive caching is a useful technique to mitigate the load on core networks, and determining the best caching placement of data time to enhance the network is a significant issue. However, radiofrequency is spreading and supporting multiple channels communication, and has a licensed
In this paper, a resource partitioning scheme combined with a new multi-carrier optical modulation technique for indoor visible light communication (VLC) system is proposed. In VLC systems, the coverage area is divided into multiple atto-cells. In each atto-cell, multiple LED arrays are used as access points (APs) serving the assigned users. The coverage area of APs might be overlapped to avoid service discontinuity for mobile users. The overlapped coverage zones result in co-channel interference (CCI). We develop a shared frequency reuse (SFR) technique combined with two resource allocation
Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, cell phone localization has become an important research problem. In this paper, we present CellSense, which is a probabilistic received signal strength indicator (RSSI)-based fingerprinting location determination system for Global System for Mobile Communications (GSM) phones. We discuss the challenges of implementing a probabilistic fingerprinting localization technique in GSM networks and present the details of the CellSense system and how it addresses
The widespread usage of WLANs and mobile devices has fostered the interest in localization systems for wireless environments. The majority of research in the context of wireless-based localization systems has focused on device-based active localization, in which devices are attached to tracked entities. Recently, device-free passive localization (DfP) has been proposed where the tracked entity is neither required to carry devices nor to participate actively in the localization process. Previous studies have focused on small areas and/or controlled environments. In this paper, we present the
Device-to-Device (D2D) communications have been highlighted as one of the promising solutions to enhance spectrum utilization of LTE-Advanced networks. In this paper, we consider a D2D transmitter cooperating with a cellular network by acting as a relay to serve one of the cellular users. We consider the case in which the D2D transmitter is equipped with an energy harvesting capability. We investigate the trade-off between the amount of energy used for relaying and the energy used for decoding the cellular user data at the relaying node. We formulate an optimization problem to maximize the
The ever-increasing dependence on the Internet is challenged by several factors impeding the smooth transition to the nomadic and ubiquitous future communications. These hindering factors are primarily attributed to the top-down approach in designing computer networks that resulted in adopting a layered architecture for abstracting network functionalities as well as for engineering protocols; a methodology that proved to be neither adaptable nor evolvable in response to changes in network operational requirements and technological advancements. This paper presents a bottom-up1 strategy for
This letter studies a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. We propose a novel secondary access protocol which alleviates sensing errors and detects the availability of primary channels with the highest ability of detection. Under the proposed protocol, the SU may access the channel at one of a predefined instants within the time slot each of which associated with a certain access probability that changes based on the sensing outcome. There is also a possibility of accessing the channel at the beginning of the
We investigate a cognitive radio system with two secondary users who can cooperate with the primary user in relaying its packets to the primary receiver. In addition to its own queue, each secondary user has a queue to keep the primary packets that are not received correctly by the primary receiver. The secondary users accept the unreceived primary packets with a certain probability and transmit randomly from either of their queues if both are nonempty. These probabilities are optimized to expand the maximum stable throughput region of the system. Moreover, we suggest a secondary multiple