Sorry, you need to enable JavaScript to visit this website.

We consider the non-orthogonal multiple access (NOMA) design for a classical two-user multiple access channel (MAC) with finite-alphabet inputs. In contrast to the majority of existing NOMA schemes using continuous Gaussian distributed inputs, we consider practical quadrature amplitude modulation (QAM) constel- lations at both transmitters, whose sizes are not necessarily the same.

Categories:
19 Views

Data ecosystems are becoming larger and more complex, while privacy concerns are threatening to erode their potential benefits. Recently, users have developed obfuscation techniques that issue fake search engine queries, undermine location tracking algorithms, or evade government surveillance. These techniques raise one conflict between each user and the machine learning algorithms which track the users, and one conflict between the users themselves. We use game theory to capture the first conflict with a Stackelberg game and the second conflict with a mean field game.

Categories:
9 Views

The growing demand for wireless connectivity has turned bandwidth into a scarce resource that has to be carefully managed and fairly distributed to users. However, the variability of the wireless channel can severely degrade the service received by each user. The Double Relay Communication Protocol (DRCP) is a transmission scheme that addresses these problems by exploiting spatial diversity to enhance the fairness of the system without requiring any additional infrastructure (i.e relay nodes or a backhaul connection).

Categories:
3 Views

We propose a novel probabilistic model for the interference power distributions in a cellular network employing MIMO beamforming in mmWave spectrum. Considering both line-of-sight (LOS) and non-line-of-sight (NLOS) propagations, we use the Gamma distribution for LOS interference power, and propose a mixture of the Inverse Gaussian and Inverse Weibull distributions for the NLOS interference power. For the NLOS mixture model, an expectation maximization algorithm is developed using both analytical moment matching and maximum likelihood estimation.

Categories:
20 Views

We present an approach for detecting application level protocols over a wireless communications link, without the need for demodulation or decryption. Our detector is suitable for diverse radio types, since only simple external signal features are used as inputs. We show that the Profile Hidden Markov Model (PHMM) is well suited to this task, due to the probabilistic nature of the wireless channel and the discrete nature of application level traffic. We include results evaluating the detection performance for two application protocols in 802.11 in the presence of background traffic.

Categories:
6 Views

In heterogeneous networks (HetNets) system, the exploitation of small cells (SCs) will be enhanced spectral efficiency that means guarantee QoS and coverage area to user terminals. We propose a joint linear precoder designproblem to maximize the energy efficiency of the HetNet model. To tackle the cross-tier interference in the HetNets, we exploit zero-forcing precoding where the interference at the users is cancelled out by block diagonalization scheme.

Categories:
16 Views

Pages