EURASIP Journal on Wireless Communications and Networking

List of Papers (Total 2,868)

ATRAS: adaptive MAC protocol for efficient and fair coexistence between radio over fiber-based and CSMA/CA-based WLANs

In this paper, we propose a medium access control (MAC) protocol to allow a radio over fiber-based wireless local area network (RoF-based WLAN) to coexist with legacy carrier sense multiple access with collision avoidance (CSMA/CA)-based WLANs. In RoF-based WLANs, there are long propagation delays between access points (APs) and stations (STAs). When an RoF-based WLAN uses the ...

Modelling and implementation of virtual radio resources management for 5G Cloud RAN

The virtualisation of Radio Access Networks (RANs) is one of the goals in designing 5G mobile networks. This paper aims at presenting a proof of concept for the virtualisation of radio resources using Open Air Interface (OAI), a software-based Long-Term Evolution (LTE) eNodeB physical emulator. OAI was extended to support multi-tenancy, representing diverse Virtual mobile Network ...

A method for identifying faulty cells using a classification tree-based UE diagnosis in LTE

The latest advances in wireless technologies have led to a proliferation of data mobile devices and services. As a consequence, mobile networks have experienced a significant increase in data traffic, while voice traffic has shown nearly no growth. It is therefore essential for operators to understand the data traffic behavior at the user level in order to ensure a good customer ...

Decoupled signal detection for the uplink of massive MIMO in 5G heterogeneous networks

Massive multiple-input multiple-output (MIMO) systems are strong candidates for future fifth-generation (5G) heterogeneous cellular networks. For 5G, a network densification with a high number of different classes of users and data service requirements is expected. Such a large number of connected devices needs to be separated in order to allow the detection of the transmitted ...

Serial distributed detection for wireless sensor networks with sensor failure

We study serial distributed detection and fusion over noisy channels in wireless sensor networks (WSNs) with bathtub-shaped failure (BSF) rate of the sensors in this paper. In the previous work, we applied BSF rate to parallel topology and derived the Extension Log-likelihood Ration Test (ELRT) rule. Although ELRT is superior to traditional fusion rule without considering failed ...

Femtocaching assisted multi-source D2D content delivery in cellular networks

The influxes of diversified services and mass data lead to exponential growth of traffic load in mobile cellular networks. Cache-enabled device-to-device (D2D) communication provides a general framework to alleviate this situation. In contrast to previous single-source D2D models, this paper investigates a comprehensive content delivery framework based on a three-tier heterogeneous ...

Performance analysis for an enhanced architecture of IoV via Content-Centric Networking

TCP/IP protocol gradually exposes many shortcomings such as poor scalability and mobility. Content-Centric Networking is a new architecture which cares about the content itself rather than its source. Therefore, this paper proposes a novel IoV architecture which based on Content-Centric Networking and tests its transmission interference time, transmission delay, and throughout in ...

Centralized coordinated scheduling in LTE-Advanced networks

This work addresses the problem associated with coordinating scheduling decisions among multiple base stations in an LTE-Advanced downlink network in order to manage inter-cell interference with a centralized controller. To solve the coordinated scheduling problem, an integer non-linear program is formulated that, unlike most existing approaches, does not rely on exact channel ...

Adaptive robust time-of-arrival source localization algorithm based on variable step size weighted block Newton method

We propose a line-of-sight (LOS)/non-line-of-sight (NLOS) mixture source localization algorithms that utilize the weighted block Newton (WBN) and variable step size WBN (VSSWBN) method, in which the weighting matrix is determined in the form of the inverse of the squared error or as an exponential function with a negative exponent. The proposed WBN and VSSWBN algorithms converge in ...

Collaborative neighbor discovery in directional wireless sensor networks: algorithm and analysis

In directional wireless sensor networks (DSNs), sensor nodes with directional antennas provide extended network lifetime and better coverage performance. However, one of the key challenges of directional nodes is to discover their neighbors due to difficulty in achieving synchronization among their directed transmissions and receptions. Existing solutions suffer from high discovery ...

Very-low-SNR cognitive receiver based on wavelet preprocessed signal patterns and neural network

A pattern-based cognitive communication system (PBCCS) that optimizes non-periodic RF waveforms for security applications is proposed. PBCCS is a cross-layer approach that merges the channel encoding and modulation. The transmitter encodes sequences of bits into continuous signal patterns by selecting the proper symbol glossaries. The cognitive receiver preprocesses the received ...

An inter-frame dynamic double-threshold energy detection for spectrum sensing in cognitive radios

This paper proposes an inter-frame dynamic double threshold (IF-DDT) spectrum sensing algorithm in order to improve the sensing performance based on energy detection (ED) in cognitive radios (CRs). Based on both the activity model of the primary user (PU) and the sensing mechanism of the secondary user (SU), the proposed algorithm exploits the relationship between two adjacent ...

Resource allocation in a MAC with and without security via game theoretic learning

In this paper, we study a K-user fading multiple access channel (F-MAC), with and without an eavesdropper (Eve). In the system without Eve, we assume that each user knows only its own channel gain and is completely ignorant about the other users’ channel state. The legitimate receiver sends a short acknowledgement message Acknowledge (ACK) if the message is correctly decoded and a ...

Massive MIMO with multi-cell MMSE processing: exploiting all pilots for interference suppression

A new state-of-the-art multi-cell minimum mean square error (M-MMSE) scheme is proposed for massive multiple-input-multiple-output (MIMO) networks, which includes an uplink MMSE detector and a downlink MMSE precoder. Contrary to conventional single-cell schemes that suppress interference using only channel estimates for intra-cell users, our scheme shows the optimal way to suppress ...

Compact UWB-MIMO antenna with metamaterial FSS decoupling structure

In this paper, an UWB-MIMO antenna with frequency selective surface (FSS) decoupling structure is proposed. To realize antenna system miniaturization and integration, silicon material is applied as substrate. The proposed antenna becomes a very compact construction with dimension of 38.2 × 26.6 × 0.4 mm3. The proposed broadband FSS unit consists of four split rectangles and one ...

Fog radio access network system control scheme based on the embedded game model

As a promising paradigm for the 5G wireless communication system, a new evolution of the cloud radio access networks has been proposed, named as fog radio access networks (F-RANs). It is an advanced socially aware mobile networking architecture to provide a high spectral and energy efficiency while reducing backhaul burden. In particular, F-RANs take full advantages of social ...

Mirror-image-based disjoint multi-paths routing algorithm for maximizing communication efficiency

The growing demands of high-speed and stable next generation 5G cellular networks become the main stream in these years. In order to overcome a bottleneck of high-speed communication which is caused by limited spectrum resources, cognitive radio (CR) network has been proposed as a promising technology in 5G networks. However, in CR networks, primary user (PU) networks lead another ...

The idea of adaptive usage of uplink frequency resources for other purposes, such as downlink data transmission, has attracted researchers for many years. As an extension of the conference paper on the same subject, this article discusses the concept of applying a multichannel simultaneous uplink and downlink transmission scheme for flexible duplexing, where the middle part of the ...

Fade statistics of ${\mathcal {M}}$ -turbulent optical links

A new and generalized statistical model, called Málaga or simply ${\mathcal {M}}$ distribution, has been derived recently to characterize the irradiance fluctuations of an unbounded optical wavefront propagating through a turbulent medium under all irradiance fluctuation conditions. The aforementioned model extends and unifies in a simple analytical closed-form expression most of ...

SNR walls in eigenvalue-based spectrum sensing

Various spectrum sensing approaches have been shown to suffer from a so-called signal-to-noise ratio (SNR)-wall, an SNR value below which a detector cannot perform robustly no matter how many observations are used. Up to now, the eigenvalue-based maximum-minimum-eigenvalue (MME) detector has been a notable exception. For instance, the model uncertainty of imperfect knowledge of the ...

Outage performance of fixed-gain and variable-gain AF full-duplex relaying in non-identical Nakagami-m fading channels

We investigate outage performance of fixed-gain and variable-gain amplify-and-forward (AF) full-duplex (FD) relaying systems under residual loop-interference (LI) in non-identical Nakagami-m fading channels. New exact outage probability expressions are derived analytically in a single-integral form by using the cumulative distribution function approach. Moreover, tight lower-bound ...

Resource allocation for spectrum-leasing based CRN with delay-sensitive traffic

In this paper, cooperative resource allocation strategies are characterized for a spectrum-leasing based cognitive radio network (CRN), where the primary system leases the licensed band to the secondary system for a fraction of time in exchange for the secondary user (SU) acting as relay. Here, both amplify-and-forward (AF) and decode-and-forward (DF) relay protocols are ...

Robust resource allocation for cognitive relay networks with multiple primary users

A robust resource allocation (RA) algorithm for cognitive relay networks with multiple primary users considering joint channel uncertainty and interference uncertainty is proposed to maximize the capacity of the networks subject to the interference threshold limitations of primary users’ receivers (PU-RXs) and the total power constraint of secondary user’s transmitter and relays. ...

Nonuniform antenna array design by parallelizing three-parent crossover genetic algorithm

Antenna plays a very important role in wireless communication. Array elements laid out nonuniformly could achieve better frequency reliability and lower sidelobe level than uniform spaced elements. Designing desirable nonuniform antenna array requires the tuning of distances between each element, excitation, amplitude, and so on. Such design problem can be solved by genetic ...

Improved symbol value selection for symbol flipping-based non-binary LDPC decoding

Symbol flipping-based hard decision decoding for non-binary low-density parity check (LDPC) codes has attracted much attention due to low decoding complexity even though the error performance of the symbol flipping decoder is inferior to that of the soft decision decoders. Standard symbol flipping decoding involves two steps, selection of the symbol position to be flipped and ...