The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to keep up with countless emerging applications requirements, cellular systems have to embed new flexible aspects, with the aim of satisfying future wireless environments expectations. In this context, we consider a cellular system based a full-duplex amplify-and-forward cooperative communication over Nakagami-m channel. We assume the direct link between the source and the destination is...
Radio energy harvesting model is an another method to extend the lifetime of wireless networks. In this paper, an energy harvesting model is given for amply-and-forward relay networks with aiding of ambient interferences. For this reason, the energy constrained relays harvest energy from the received signal and then use that harvested energy to amply and send that signal to the target. A time switching...
Spectrum sharing environment permits secondary users (SUs) to utilize radio spectrum of primary users (PUs) but creates cross-interference between SUs and PUs. Moreover, jamming signal is useful in improving information security by deliberately corrupting received signals at eavesdroppers. The current paper presents an analytical framework on communication reliability and information security, which...
In this paper, we propose a novel m-th best average biased received power (ABRP) user association (UA) scheme for K-tier heterogeneous networks (HetNets), where a user is associated with the base station (BS) having the m-th strongest ABRP. For this novel scheme, by using stochastic geometry and modeling the positions of network elements in each tier as a homogeneous Poisson point process (PPP), we...
This paper investigates physical layer security of non-orthogonal multiple access (NOMA) in cognitive radio (CR) networks. The techniques of NOMA and CR have improved the spectrum efficiency greatly in the traditional networks. Because of the difference in principles of spectrum improving, NOMA and CR can be combined together, i.e. CR NOMA network, and have great potential to improving the spectrum...
We propose a wireless power transfer (WPT) based underlay spectrum sharing scheme, where a primary user (PU) needs to harvest wireless energy from an access point (AP) and then transmit its data to AP using the harvested energy. In the same area, a secondary transmitter (ST) intends to communicate with a secondary receiver (SR). The secondary data can be transmitted along with the WPT, which can on...
In this paper, we consider a two-hop cooperative relaying network in a randomly distributed interference environment, where the source communicates with the destination, assisted by N decode-and-forward (DF) relays. We consider the interference-limited environments, where the received signals at the relays and the destination are degraded by random interference nodes distributed according to homogeneous...
In this paper, we investigate the secrecy performance of a cognitive untrusted relay network with a direct link using selection combining (SC) scheme, where a secondary source communicates with a secondary destination through an untrusted relay. We first examine the connection outage probability (COP) and secrecy outage probability (SOP) to investigate the reliability and security performance of the...
In this paper, we investigate the impact of the carrier-sensing range on the link performance in a dense wireless network. Considering small-scale fading effects, we fix the carrier-sensing threshold and adaptively adjust the carrier-sensing range. At first, we assume a close transmitter-receiver distance and model the network nodes as a homogeneous Poisson point process (PPP). Then we obtain the...
Non-orthogonal multiple access (NOMA), which is an effective solution to improve spectral efficiency, has been considered as an emerging candidate for the fifth generation (5G) multiple access. In this paper, the authors mainly study a NOMA-based multiple-antenna relaying network over Nakagami-m fading channels. In order to measure the performance of the system, the exact outage probability and the...
The role of Heterogeneous Networks (HetNets) at providing sufficient capacity based on fast growing demands of user equipment (UE) is not deniable. Design of a secure and robust authentication mechanism for the mobile users is essential on the other hand. A mathematical model of a HetNet equipped with butterfly-graph authentication mechanism is derived here that takes into account packet loss probability...
In the communication process, when channel capacity is large enough, channel quality is decided by the wrong acceptance sequence of data packet due to channel interfere, communication limited and so on. This paper surveyed the effect of channel on data sequence reception. The simulation show the relationship between acceptance sequence and channel quality.
This paper analyzes and evaluates joint effect of primary interference and artificial noise on information securing capability of cognitive radio networks (CRNs) under interference power constraint, peak transmit power constraint, and Rayleigh fading. An exact formula for an important security performance metric, secrecy outage probability, is first derived and then validated by computer simulations...
Recently, much attention has been given to femtocell networks and their potential application in high peak load areas such as airports and arrival train stations. A dense femtocell network provides an efficient and low cost solution to respond to high traffic demand. When a densely deployed femtocell network is underutilized during low traffic load this creates interference among registered and unregistered...
In this paper, we investigate the problem of finding optimal location of the relay node in an underlay cognitive full-duplex relay (CogFDR) network. First of all, an analytical model for the outage probability experienced by the secondary user in a CogFDR network assuming Rayleigh fading channel and neglecting the interference from the primary transmitter is considered. Then, a non-linear optimization...
This paper investigates multi-user scheduling in a full-duplex (FD) wireless-powered communication network, consisting of multiple energy harvesting (EH) source nodes (SNs) and one FD hybrid access point (HAP). All SNs have no embedded energy supply and thus need to perform EH before transmitting their data to the HAP. Thanks to the FD capability, the HAP simultaneously receives data from the scheduled...
Cache is becoming an effective method to improve the transmission rate and reduce the backhaul load. Nevertheless, owing to the limited capacity of backhaul, less power should be allocated to the users whose requested contents do not exist in the local caches to maximize the performance of the caching users. Thus, in this paper, power allocation (PA) is considered to further improve the performance...
Device to Device (D2D) communication with content caching has recently been proposed as an exciting and innovative technology for next generation cellular networks. This paper presents a novel content caching and delivery method which allows multiple devices caching the same content and the content being sent via multiple devices to single device (MDSD) communication using D2D links to enhance user...
In this paper, the outage performance of hybrid automatic repeat request (hybrid-ARQ) over a full- duplex decode-and-forward relay network is analyzed. Nakagami-m distribution is assumed for fading channels such that the analysis results can be easily extended to other fading distributions. Compared to the conventional half-duplex relay mode, full-duplex relay network enables the relay nodes to receive...
In random machine-to-machine (M2M) networks, the network topology along with the variation of the wireless channel are the main sources of uncertainty that affect the network performance. Unlike most prior works, which assume a reference receiver such as aggregator located at a certain fixed point, this paper discusses a more general case where the intended receiving node can be any randomly-located...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.