EURASIP Journal on Wireless Communications and Networking

http://link.springer.com/journal/13638

List of Papers (Total 2,915)

A complete cell search and synchronization in LTE

The initial process of identifying any available base station (BS) by a user equipment (UE) that wants to communicate is termed as cell search. To ensure a reliable communication, any UE has to be synchronized with the BS both in time and frequency domains. Cell search process is said to be complete once cell ID associated with long-term evolution (LTE) BS is decoded successfully. ...

Active filter synthesis based on nodal admittance matrix expansion

Active network synthesis is important for circuit designer to find new circuits with desired performance. In this paper, a method of Tow-Thomas (TT) Bi-quad band-pass filter circuit generation methods is proposed using nullor representation of the operational amplifier (OPA), and a method for synthesizing active band-stop filters is presented, both of which start from voltage ...

Neighbors-Aware Proportional Fair scheduling for future wireless networks with mixed MAC protocols

In this paper, we consider a beyond-5G scenario, where two types of users, denoted as scheduled and uncoordinated nodes, coexist on the same set of radio resources for sending data to a base station. Scheduled nodes rely solely on a centralized scheduler within the base station for the assignment of resources, while uncoordinated nodes use an unslotted Carrier Sense Multiple Access ...

Efficient message exchange protocols exploiting state-of-the-art PHY layer

The paper focuses on the two-way relay channel (TWRC) and the multi-way wireless network with three terminals, where all three want to exchange or share data and have to do that with the help of a relay. This paper shows how it is possible to significantly decrease the number of time slots required to exchange messages between terminals in networks based on time-division multiple ...

Partial relay-based cooperative primary user detection in cognitive radio networks

In order to identify spectrum holes, secondary users (SUs) should detect whether the spectrum band is occupied by primary user (PU). Cooperative PU detection is the most prevalent PU detection method in cognitive radio (CR) networks. Existing cooperative PU detection usually consumes a dedicated reporting channel to share the detection results. This paper proposes a partial ...

Evaluation of a duty-cycled asynchronous X-MAC protocol for vehicular sensor networks

An asynchronous medium access control (MAC) duty-cycled protocols have higher energy efficiency and lower packet latency than synchronized ones due to reduced idle listening. Moreover, they provide efficient utilization of energy supplied to mobile sensors. They are considered very important in MAC protocols due to the adverse effects of hidden terminals which causes energy ...

Service- and interference-aware dynamic TDD design in 5G ultra-dense network scenario

The 5G wireless communication system supports varied applications, making the uplink/downlink traffic asymmetry more and more serious. Dynamic time division duplex (TDD) technique has become a key technology of 5G networks due to its flexibility to support asymmetric services. In this paper, we study dynamic TDD sub-frame reconfiguration algorithm based on shifting. Firstly, we ...

Efficiency enhancement by reconfigurable matching networks in LINC transmitters

This paper proposes the use of a transmitter based on a linear amplification with nonlinear components (LINC) architecture, in which the reconfigurable matching networks (RMNs) are included. By varying the RMN active cell number, it is possible to change the load impedance at the power amplifier (PA) output, improving the amplifier drain efficiency and therefore the efficiency of ...

Mission-critical monitoring based on surround suppression variational Retinex enhancement for non-uniform illumination images

In this letter, a surround suppression variational Retinex enhancement algorithm (SSVR) is proposed for non-uniform illumination images. Instead of a gradient module, a surround suppression mechanism is used to provide spatial information in order to constrain the total variation regularization strength of the illumination and reflectance. The proposed strategy preserves the ...

5G transport network requirements for the next generation fronthaul interface

To meet the requirements of 5G mobile networks, several radio access technologies, such as millimeter wave communications and massive MIMO, are being proposed. In addition, cloud radio access network (C-RAN) architectures are considered instrumental to fully exploit the capabilities of future 5G RANs. However, RAN centralization imposes stringent requirements on the transport ...

Interference mitigation using random antenna selection in millimeter wave beamforming system

In multi-user beamforming systems, the inter-user interference are controlled by spatial filtering. Since the implementation of digital beamforming is difficult due to high hardware cost of large array system, the analog beamforming system with one phase shifter at each antenna element is considered with antenna selection scheme. However, the beamwidth is not sufficiently narrow to ...

Spectrum sharing via hybrid cognitive players evaluated by an M/D/1 queuing model

We consider a cognitive wireless network in which users adopt a spectrum sharing strategy based on cooperation constraints. The majority of cognitive radio schemes bifurcate the role of players as either cooperative or non-cooperative. In this work, however, we modify this strategy to one in which players are hybrid, i.e., both cooperative and non-cooperative. Using a Stackelberg ...

An efficient algorithm for the reconstruction of punctured convolutional codes

Puncturing is one of the methods of increasing the code rate, and the original code before puncturing is called the mother code. Any (N,K) convolutional code is obtainable by puncturing some (n,1) mother codes. The objective of a blind recognition of a channel code is to obtain its generator from the intercepted noisy bit stream. The process of the blind recognition of punctured ...

Adaptive Sleep Efficient Hybrid Medium Access Control algorithm for next-generation wireless sensor networks

The scheduling algorithm is a fundamental design problem to allocate resources amongst different entities in distributive wireless sensor networks (WSNs). These sensor nodes have limited power and non-replenishable energy resources. In WSNs, the duty cycling mechanism is commonly used to save energy due to idle listening. On the other hand, a fixed duty cycling mechanism increases ...

In-band full-duplex medium access control design for heterogeneous wireless LAN

Full-duplex (FD) wireless communication is evolving into a practical technique, and many studies are being conducting in this area, especially regarding the physical layer. However, to exploit FD benefit successfully, efficient medium access control (MAC) protocols are crucial as well as physical layer advances. Numerous FD-MAC protocols have been proposed, but these MAC protocols ...

On the energy/spectral efficiency of multi-user full-duplex massive MIMO systems with power control

In this paper, we consider a multi-user full-duplex (FD) massive multiple-input multiple-output (MIMO) system. The FD base station (BS) is equipped with large-scale antenna arrays, while each FD user is equipped with two antennas (one for transmission and the other one for reception). We assume that the channel state information (CSI) is imperfect, and no instantaneous CSI of loop ...

Distributed probabilistic data association detector with turbo base-station cooperations in multi-user multi-cell MIMO systems

We address the severe interference condition with unity frequency re-use factor in each cell and propose a novel distributed receiver for reliable detection of the uncoded data transmitted in multi-user multi-cell multiple input, multiple output (MIMO) systems. The new algorithm employs distributed probabilistic data association (PDA) with turbo base-station (BS) cooperations ...

Performance evaluation of chaotic spreading sequences on software-defined radio

In this paper, bit error performance evaluation of chaotic sequences is presented. Performance of chaotic sequences is evaluated on multiple access spread spectrum system model for USRP software defined radio. LabVIEW is used to perform numerical simulations and bit error rate analysis. Chaotic sequences of different lengths are generated using one-dimensional, two-dimensional, and ...

Simple solution to the optimal deployment of cooperative nodes in two-dimensional TOA-based and AOA-based localization system

Cellular-based cooperative communication is a promising technique that allows cooperation among mobile devices not only to increase data throughput but also to improve localization services. For a certain number of cooperative nodes, the geometry plays a significant role in enhancing the accuracy of target. In this paper, a simple solution to the deployment of cooperative nodes ...

Modelling virtual radio resource management in full heterogeneous networks

Virtual radio access networks (RANs) is the candidate solution for 5G access networks, the concept of virtualised radio resources completing the virtual RAN paradigm. This paper proposes a new analytical model for the management of virtual radio resources in full heterogeneous networks. The estimation of network capacity and data rate allocation are the model’s two main components. ...

Pulse shaping design for OFDM systems

Spectrally contained OFDM-based waveforms are considered key enablers for a flexible air interface design to support a broad range of services and frequencies as envisaged for 5G mobile systems. By allowing for the flexible configuration of physical layer parameters in response to diverse requirements, these waveforms enable the in-band coexistence of different services. One ...

On the Exact Distribution of Mutual Information of Two-User MIMO MAC Based on Quotient Distribution of Wishart Matrices

We propose an exact calculation of the probability density function (PDF) and cumulative distribution function (CDF) of mutual information (MI) for a two-user multiple-input multiple-output (MIMO) multiple access channel (MAC) network over block Rayleigh fading channels. This scenario can be found in the uplink channel of MIMO non-orthogonal multiple access (NOMA) system, a ...

Full-duplex amplify-and-forward relays with optimized transmission power under imperfect transceiver electronics

In-band full-duplex (FD) relays are useful for extending coverage areas and increasing overall throughput in wireless networks. The main technical difficulty hindering their implementation and use is their inherent self-interference (SI), generated due to simultaneous in-band reception and forwarding. Efficient SI mitigation is a practical necessity, and the imperfections in ...