The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate the outage probability in decoding the rateless codes when a certain amount fountain encoded symbols are generated, and then transmitted through a memoryless erasure channel (MEC). We obtain a closed-form formula for the outage probability by accounting for the complete effect of the channel on the distribution of the received symbols. Moreover, a new model with high...
Prioritization of the data collected by the Wireless Sensor Networks (WSNs) can provide promising performance enhancements for applications that monitor and control the critical systems. Particularly, in smart grid, defense and e-health applications, delivering high priority data with low latency is important. Previous works have focused on various cross layer approaches for providing Quality of Service...
In this talk, we present techniques to enable green communications in future generation of wireless systems that will rely on cooperation and cognition to meet increasing demand of high data rate. So far, achieving high data rate has been the primary focus of research in cooperative and CR systems, without much consideration of energy efficiency. However, many of these techniques significantly increase...
The DSRC safety messaging system was initially proposed for emergencies and vehicle safety applications; having a high reliability is a major design factor. Due to the fact that the DSRC system has different data rates according to its modulation and coding schemes, a minimum SNR threshold for different data rates is required for successful message transmission. This paper provides the different SNR...
In the paper, we consider information transmission over a block Rayleigh fading channel, where a finite length buffer is employed to match the source traffic. We evaluate the channel utilization efficiency and overflow performance by inputting a constant rate source traffic stream to the buffer and adjust its transmission rate over the block Rayleigh fading channel according to the channel states...
Under the assumption of a log-normal path loss model, maximum likelihood (ML) emitter location estimators are derived for both received signal strength (RSS) and received signal strength difference (RSSD) information. It is then shown that these ML estimators are identical, contrary to the seemingly common perception that the RSS-based ML location estimator should outperform the RSSD-based ML location...
Although error-prone patterns have been extensively studied for low-density parity-check (LDPC) codes, to the best of our knowledge, they have never been fully explored for Fountain codes. It is shown that dominant trapping sets of Fountain codes are the absorbing sets. They happen in the so-called error floor, corresponding to a significant flattening in the error probability curves. In this paper,...
This paper discusses mobile hidden station (MHS) problem which is a significant source of packet collisions in medium access control (MAC) protocols of vehicular networks due to relatively high node speeds. MHS problem occurs when mobile stations that are not present in the channel reservation period enter and disturb the existing communications. We present effect of MHS problem using Markov model...
The 2012 26th Biennial Symposium on Communications (QBSC) proceedings was produced for IEEE by The Printing House, Inc. Copyright and Reprint Permission: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the...
We study the error rate of a subcarrier intensity modulated multiple-input multiple-output wireless optical communication system employing phase-shift keying, differential phase-shift keying, and noncoherent frequency-shift keying over the Gamma-Gamma turbulence channels. Closed-form error rate expressions are derived using a series expansion approach. Truncation error analysis and asymptotic error...
In this paper, we propose a novel cooperative multi-hop transmission protocol (NCMT). In the proposed protocol, cooperative communication is used to decrease the end-to-end outage probability and reduce the number of transmissions due to the skipped hops. The performances are evaluated via theoretical analyses and Monte Carlo simulations.
The transmission of a single bit over the Poisson channel is considered when a noiseless feedback is available. We consider two cases: with and without peak power constraint. In the absence of peak power constraint, we show that sending one single bit reliably through a continuous-time Poisson channel requires at least half the energy of a photon. On the other hand, when a peak power constraint is...
The problem of coverage in sensor network can be faced in different fields, each having its own special meaning, terminologies and objectives. However, the ultimate goal of solving a ‘coverage problem’ is to blanket a specific ‘region’ with specific ‘observers’. The region can be planar or volumetric, and the observers can be of limited capabilities. A wireless sensor network is said to provide full...
In this paper, we propose CCAWSN — a Cognitive Communication Architecture for Wireless Sensor Networks. Cognition in the context of sensor networks deals with the ability to be aware of the environment and end-user requirements and proactively adapt to them, thus benefiting the network as a whole. The network architecture, its cognitive components and interaction among them are the main focus and...
This article analyzes the outage performance of Decode and Forward (DF) incremental relaying when used in an overlay spectrum sharing environment. The terminals of a secondary network exploit the instances of silence of a neighboring primary user to communicate with each other. Secondary terminals utilize an arbitrary spectrum sensing method that is prone to miss-detection and false alarms. The derived...
Spectrum sharing is an important topic in cognitive radio sensor networks (CRSNs). Bio-inspired consensus-based schemes can provide lightweight and efficient solutions to ensure spectrum sharing fairness in CRSNs. In this paper, in order to achieve the defined spectrum sharing fairness, we propose two schemes called the local control scheme for unbiased fairness (LCS-UF) and the local control scheme...
We consider the transmission of a memoryless Gaussian source over a power-constrained Rayleigh fading channel with additive white Gaussian noise. We propose the use of low-delay joint source-channel mappings and consider optimizing the non-parametric mappings through an iterative process. A design algorithm for joint source-channel mapping is proposed and numerically evaluated for 2:1, 3:1, and 4:1...
The subspace constrained mean shift (SCMS) algorithm is an iterative method for finding an underlying manifold associated with an intrinsically low dimensional data set embedded in a high dimensional space. We investigate the application of the SCMS algorithm to the problem of noisy source vector quantization where the clean source needs to be estimated from its noisy observation before quantizing...
Given the relatively low costs associated with its deployment and its capacity to deliver last mile wireless broadband access, WiMAX and LTE are the current technologies of choice to effectively meet the increasing demand for high bandwidth services and applications. In the literature, several pseudo scheduling algorithms, which are very often time-independent, have been proposed to optimize the scheduling...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.