Design and implementation of an ethernet-VLC interface for broadcast transmissions
In this work, a complete interface between Ethernet and Visible Light Communications (VLC) networks is presented. It requires the use of previously proposed DPPM schemes for this kind of applications, but with some modifications so as to keep constant ...
Resource allocation for parallel Gaussian MIMO wire-tap channels
Wire-tap channels are able to provide perfect secrecy when a receiver exhibits a better channel than its wiretapping opponent. In this letter, we extend the perfect secrecy principle to parallel Gaussian multiple input multiple output (MIMO) wire-tap ...
Cross-layer optimization of radio sleep intervals to increase thin client energy efficiency
- Pieter Simoens,
- Farhan Azmat Ali,
- Bert Vankeirsbilck,
- Lien Deboosere,
- Filip De Turck,
- Bart Dhoedt,
- Piet Demeester,
- Rodolfo Torrea-Duran
Thin client computing trades local processing for network bandwidth consumption by offloading application logic to remote servers. User input and display updates are exchanged between client and server through a thin client protocol. This thin client ...
On exploiting spatial-temporal uncertainty in max-min fairness in underwater sensor networks
Due to a high propagation delay in Underwater Sensor Networks (UWSNs), i.e., Spatial-Temporal Uncertainty, traditional approaches for solving the max-min fairness issue in terrestrial MACs do not work well in UWSNs. In this work, we address the max-min ...
Energy-efficient and low-complexity schemes for uplink cognitive cellular networks
This Letter proposes two types of energy-efficient and low-complexity schemes for uplink cognitive cellular networks. In the considered system, both cognitive users (CUs) and primary user (PU) share the same base station (BS). Under an outage ...
Mitigation of compromising privacy by transmission range control in wireless sensor networks
Wireless sensor networks (WSNs) are used to obtain information from the surrounding areas and collected data is reported to the base station through wireless links. In certain scenarios ongoing transmissions within the network need to be concealed so ...
Random-restart reactive tabu search algorithm for detection in large-MIMO systems
We present a low-complexity algorithm based on reactive tabu search (RTS) for near maximum likelihood (ML) detection in large-MIMO systems. The conventional RTS algorithm achieves near-ML performance for 4-QAM in large-MIMO systems. But its performance ...
A novel timing synchronization method for OFDM systems
In this letter, a novel timing offset estimation method is presented for orthogonal frequency division multiplexing (OFDM) systems. The proposed method is developed on the basis of the cyclic structure of OFDM symbol and uses a new noise subspace based ...
DRX-aware scheduling method for delay-sensitive traffic
The Long Term Evolution (LTE) system adopts Discontinuous Reception (DRX) in the link level for power saving to extend the battery life of the User Equipment (UE). A novel real-time DRX-aware scheduling method is proposed for delay-sensitive services in ...
Reduction of PAPR without side information for frequency switched transmit diversity-based MIMO-OFDM systems
Frequency switched transmit diversity (FSTD) is a simple diversity technique which can be easily combined with existing multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) schemes to support an increased number of ...
Resource allocation for mitigating the effect of sensing errors in cognitive radio networks
This letter proposes a resource allocation scheme to mitigate the effect of sensing errors in cognitive radio networks. When a spectrum sensor misses primary signals, the secondary transmission can be interfered with by the primary transmission, whereas ...
An investigation of stochastic market equilibrium in cognitive radio networks
In this letter, we model a cognitive radio network as an interference market where each primary user (PU) and secondary user (SU) are price-taking interference offerers and purchasers, respectively. We consider stochastic interference demands of SUs and ...
Approaching large-system limits faster in multiuser MIMO with adaptive channel feedback adjustments
In this paper, we focus on the well-known drawback of per user unitary beamforming rate control (PU2RC) that sum throughput severely degrades with a small number of users due to the mismatch between the actual link quality and channel feedback of users. ...
Randomized power control for two-hop interference channels
This letter studies power control for a two-hop interference channel. An innovative solution based on mixed strategy game theory is proposed to enable the users to transmit probabilistically. This creates orthogonal transmission opportunities and thus ...
Distributed beamforming techniques for weighted sum-rate maximization in MISO interference channels
This letter proposes a beamforming technique for weighted sum-rate (WSR) maximization in multiple-input single-output (MISO) interference channels. In order to solve the WSR maximization problem in a distributed manner, we obtain a decoupled problem by ...
A fast handover authentication mechanism based on ticket for IEEE 802.16m
IEEE 802.16m is now under consideration by the ITU to become the IMT-Advanced standard. However, handover authentication is a critical issue in this area. In this letter, we propose a fast handover authentication mechanism based on ticket for IEEE ...
Capacity analysis of opportunistic relaying in cooperative systems with outdated channel information
In this paper, we analyze the Shannon capacity of the opportunistic relaying technique in amplify-and-forward cooperative systems over Rayleigh fading channels under outdated channel information. Closed-form expressions are derived for the average ...
Novel distributed space-time trellis codes for relay systems over cascaded Rayleigh fading
In this letter, we consider the deployment of distributed space-time trellis codes (STTCs) for user cooperation. We derive a pairwise error probability (PEP) expression for distributed STTCs over cascaded Rayleigh fading channels. Using the derived PEP ...
An improved selection cooperation scheme for decode-and-forward relaying
In this letter, an improved selection cooperation (ISC) scheme for decode-and-forward relaying is proposed based on selection cooperation (SC) strategy. Assuming that channels suffer from independent non-identical Rayleigh fading, we derive closed-form ...
The gamma variate with random shape parameter and some applications
This letter provides a new outlook at the Gamma distribution and its involvement in the performance analysis of digital communications over wireless fading channels. Whereas the Gamma distribution is usually regarded as a two-parameter distribution with ...
A novel decoding-and-forward scheme with joint modulation for two-way relay channel
In this letter, a novel decode-and-forward (DF) strategy for the two-way relay over Rayleigh fading channels is presented and analyzed. By encoding the two messages jointly at the relay node, the proposed scheme (termed DF-JM) can effectively handle ...
Diversity exploitation in multi-source cooperations with multiple antennas at the destination
In amplify-and-forward (AF) based multisource multi-relay cooperative networks, system diversity will be restricted by the channels of the forwarding hop in the absence of direct source-destination links in Rayleigh fading. In this letter, we dedicate ...
Improved construction of irregular progressive edge-growth tanner graphs
The progressive edge-growth algorithm is a well-known procedure to construct regular and irregular low-density parity-check codes. In this paper, we propose a modification of the original algorithm that improves the performance of these codes in the ...
Sliding window algorithm for TBCC decoding
This study modifies the wrap-around Viterbi algorithm (WAVA) for tailbiting convolutional codes (TBCCs). The proposed modification is based on the fact that it is unnecessary to decode a codeword of TBCCs from the beginning of the codeword. WAVA must ...
Direction of departure (DOD) and direction of arrival (DOA) estimation in MIMO radar with reduced-dimension MUSIC
This letter discusses the problem of direction of departure (DOD) and direction of arrival (DOA) estimation for multi-input multi-output (MIMO) radar, and derives a reduced-dimension multiple signal classification (MUSIC) algorithm therein. The proposed ...
Combined ML and DFE decoding for coded double STBC-OFDM system
An efficient combined maximum likelihood (ML) and decision feedback equalization (DFE) decoding method is proposed for a coded double space-time block code orthogonal frequency division multiplexing (DSTBC-OFDM) system. For the missing bit log ...
An efficient receiver for preamble detection in LTE SC-FDMA systems with an antenna array
In this letter, we propose an efficient low complexity receiver for the preamble detection in single-carrier frequency division multiple access (SC-FDMA) systems with an antenna array. The proposed low complexity receiver is derived using a digital ...
Detection of multicast video flooding attack using the pattern of bandwidth provisioning efficiency
The rapid increase of distributed denial-of-service (DDoS) attacks, which deplete a link bandwidth and service resource by sending a tremendous flooding of traffic to a victim server, has threatened fundamental network service stability. First, this ...
On the complexity of optical cross-connects under flat and recursive shared wave-mixing converters
Wave-mixing Optical Cross-Connects (WM-OXCs) reduce complexity by using bulk wavelength converters (BWCs) to simultaneously convert multiple distinct wavelength channels. This letter investigates the complexity of WM-OXCs under two BWCs sharing schemes, ...
Scheduling data broadcast: an efficient cut-off point between periodic and on-demand data
Collecting statistics from client requests, the broadcast server partitions data items into hot and cold-item sets to perform a hybrid broadcast scheduling. Hot items are broadcast periodically with periods based on their access probabilities. Cold ...