72,311 research outputs found

    Imperfect Digital Fibre Optic Link Based Cooperative Distributed Antennas with Fractional Frequency Reuse in Multicell Multiuser Networks

    No full text
    The achievable throughput of the entire cellular area is investigated, when employing fractional frequency reuse techniques in conjunction with realistically modelled imperfect optical fibre aided distributed antenna systems (DAS) operating in a multicell multiuser scenario. Given a fixed total transmit power, a substantial improvement of the cell-edge area's throughput can be achieved without reducing the cell-centre's throughput. The cell-edge's throughput supported in the worst-case direction is significantly enhanced by the cooperative linear transmit processing technique advocated. Explicitly, a cell-edge throughput of η=5\eta=5 bits/s/Hz may be maintained for an imperfect optical fibre model, regardless of the specific geographic distribution of the users

    Cooperative monocular-based SLAM for multi-UAV systems in GPS-denied environments

    Get PDF
    This work presents a cooperative monocular-based SLAM approach for multi-UAV systems that can operate in GPS-denied environments. The main contribution of the work is to show that, using visual information obtained from monocular cameras mounted onboard aerial vehicles flying in formation, the observability properties of the whole system are improved. This fact is especially notorious when compared with other related visual SLAM configurations. In order to improve the observability properties, some measurements of the relative distance between the UAVs are included in the system. These relative distances are also obtained from visual information. The proposed approach is theoretically validated by means of a nonlinear observability analysis. Furthermore, an extensive set of computer simulations is presented in order to validate the proposed approach. The numerical simulation results show that the proposed system is able to provide a good position and orientation estimation of the aerial vehicles flying in formation.Peer ReviewedPostprint (published version

    Wireless Network-Level Partial Relay Cooperation: A Stable Throughput Analysis

    Full text link
    In this work, we study the benefit of partial relay cooperation. We consider a two-node system consisting of one source and one relay node transmitting information to a common destination. The source and the relay have external traffic and in addition, the relay is equipped with a flow controller to regulate the incoming traffic from the source node. The cooperation is performed at the network level. A collision channel with erasures is considered. We provide an exact characterization of the stability region of the system and we also prove that the system with partial cooperation is always better or at least equal to the system without the flow controller.Comment: Submitted for journal publication. arXiv admin note: text overlap with arXiv:1502.0113

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Detect-and-forward relaying aided cooperative spatial modulation for wireless networks

    No full text
    A novel detect-and-forward (DeF) relaying aided cooperative SM scheme is proposed, which is capable of striking a flexible tradeoff in terms of the achievable bit error ratio (BER), complexity and unequal error protection (UEP). More specifically, SM is invoked at the source node (SN) and the information bit stream is divided into two different sets: the antenna index-bits (AI-bits) as well as the amplitude and phase modulation-bits (APM-bits). By exploiting the different importance of the AI-bits and the APM-bits in SM detection, we propose three low-complexity, yet powerful relay protocols, namely the partial, the hybrid and the hierarchical modulation (HM) based DeF relaying schemes. These schemes determine the most appropriate number of bits to be re-modulated by carefully considering their potential benefits and then assigning a specific modulation scheme for relaying the message. As a further benefit, the employment of multiple radio frequency (RF) chains and the requirement of tight inter-relay synchronization (IRS) can be avoided. Moreover, by exploiting the benefits of our low-complexity relaying protocols and our inter-element interference (IEI) model, a low-complexity maximum-likelihood (ML) detector is proposed for jointly detecting the signal received both via the source-destination (SD) and relay-destination (RD) links. Additionally, an upper bound of the BER is derived for our DeF-SM scheme. Our numerical results show that the bound is asymptotically tight in the high-SNR region and the proposed schemes provide beneficial system performance improvements compared to the conventional MIMO schemes in an identical cooperative scenario.<br/

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig
    corecore