about.jpg

Space-time coding for an energy harvesting cooperative secondary terminal

In this letter, we consider a cognitive scenario where an energy harvesting secondary user (SU) shares the channel with a primary user (PU). The SU is equipped with two antennas. It maintains a finite capacity energy queue and two infinite capacity data queues: one for storing its own data packets and the other for storing the primary undelivered data packets. The PU communicates with its destination whenever it has data at its queue head. During idle sessions of the PU, if the secondary energy queue maintains at least κ packets, the SU employs the Alamouti coding scheme over two of its data

Software and Communications

Effective area spectral efficiency for wireless communication networks with interference management

In this paper, we introduce a new metric, namely, effective area spectral efficiency (EASE), to quantify the spectral efficiency as well as the spatial properties of point-to-point transmission systems and decode and forward (DF) relaying communications networks with interference management. For each transmission mode, we derive a closed-form expression for the maximum transmission range under Rayleigh fading environment. Based on the maximum transmission range, we define and derive the average affected area and the average ergodic capacity. We then introduce the EASE expression to quantify

Software and Communications

Admission and power control for spectrum sharing cognitive radio networks

We investigate the problem of admission and power control considering a scenario where licensed, or primary, users and cognitive radios, or secondary users, are transmitting concurrently over the same band. The primary users share a common receiver and the interference on this receiver from secondary users should be strictly limited to a certain level. Each secondary link is assumed to have a minimum quality of service (QoS) requirement that should be satisfied together with the interference limit constraint, otherwise the secondary link is not admitted. Under those constraints, admission and

Software and Communications

Adaptive linearly constrained minimum variance beamforming for multiuser cooperative relaying using the kalman filter

In this paper, we consider a wireless communication scenario with multiple source-destination pairs communicating through several cooperative amplify-and-forward relay terminals. The relays are equipped with multiple antennas that receive the source signals and transmit them to the destination nodes. We develop two iterative relay beamforming algorithms that can be applied in real-time. In both algorithms, the relay beamforming matrices are jointly designed by minimizing the received power at all the destination nodes while preserving the desired signal at each destination. The first algorithm

Software and Communications

Enhancing earth-to-satellite FSO system spectrum efficiency with adaptive M-ary PSK and SIMO in presence of scintillation and beam wander

In this paper, the performance of the free-space optical (FSO) system from ground-to-satellite is analyzed considering the combined effect of atmospheric turbulence and beam wandering employing M-ary phase-shift keying (MPSK). Key parameters of the vertical connection, such as satellite altitude, zenith angle, and beam size, are investigated. In order to improve the spectrum efficiency, an adaptive transmission approach is applied to ensure efficient channel capacity usage. The procedure depends on changing the modulation order of the MPSK scheme according to the instantaneous channel state

Software and Communications

Adaptive puncturing for coded OFDMA systems

A scheme is proposed for adaptively changing the code rate of coded OFDMA systems via changing the puncturing rate within a single codeword (SCW). In the proposed structure, the data is encoded with the lowest available code rate then it is divided among different resource blocks (tiles) where it is punctured adaptively based on some measure of the channel quality for each tile. The proposed scheme is compared against using multiple codewords (MCWs) where the transmitter divides the data over tiles and encodes them separately. We investigate two different adaptive modulation and coding (AMC)

Software and Communications

On the delay limited secrecy capacity of fading channels

In this paper, the delay limited secrecy capacity of the flat fading channel is investigated under two different assumptions on the available transmitter channel state information (CSI). The first scenario assumes perfect prior knowledge of both the main and eavesdropper channel gains. Here, upper and lower bounds on the secure delay limited capacity are derived and shown to be tight in the high signal-to-noise ratio (SNR) regime (for a wide class of channel distributions). In the second scenario, only the main channel CSI is assumed to be available at the transmitter. Remarkably, under this

Software and Communications

Adaptive puncturing and rate selection in single-codeword turbo-coded OFDMA

This paper proposes using adaptive puncturing for rate-adaptive OFDMA systems utilizing turbo codes. The scheme is based on adaptively puncturing a Single Code Word (SCW) and hence adaptively changing the rate within the codeword. We compare the SCW against the Multiple Code-Words (MCWs) scheme where different rates are obtained by separate encoding, puncturing, and interleaving on a per-tile basis. Noticeable gains are obtained over the MCW scheme due to the use of larger turbo block sizes and hence larger interleavers. The SCW has around 1dB gain in goodput compared to MCWs, with much

Software and Communications

HyberLoc: Providing physical layer location privacy in hybrid sensor networks

In many hybrid wireless sensor networks' applications, sensor nodes are deployed in hostile environments where trusted and un-trusted nodes co-exist. In anchor-based hybrid networks, it becomes important to allow trusted nodes to gain full access to the location information transmitted in beacon frames while, at the same time, prevent un-trusted nodes from using this information. The main challenge is that un-trusted nodes can measure the physical signal transmitted from anchor nodes, even if these nodes encrypt their transmission. Using the measured signal strength, un-trusted nodes can still

Software and Communications

Power control for constrained throughput maximization in spectrum shared networks

We investigate power allocation for users in a shared spectrum network. In such a network, the primary (licensed) users communicate under a minimum guaranteed quality of service (QoS) requirements, whereas the secondary users opportunistically access the primary band. Our objective is to find a power control scheme that determines the transmit power for both primary and secondary users so that the overall network throughput is maximized while maintaining the quality of service of the primary users greater than a specified minimum limit. In the assumed model, no interference cancellation is

Software and Communications