Computer Science & Engineering: المرسلات الحديثة
السجلات المعروضة 1441 -- 1460 من 2402
-
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ... -
Power control and group proportional fairness for frequency domain resource allocation in L-SC-FDMA based LTE uplink
( Kluwer Academic Publishers , 2015 , Article)Resource allocation in Long Term Evaluation (LTE) uplink is challenging because of two reasons: (1) it requires contiguous resource block allocation and (2) high complexity due to per user based power allocation among ... -
Energy-cost-distortion optimization for delay-sensitive M-health applications
( IEEE Computer Society , 2015 , Conference Paper)Mobile-health (m-health) systems leverage wireless and mobile communication technologies to promote new ways to acquire, process, transport, and secure the raw and processed medical data to provide the scalability needed ... -
Secret key generation based on AoA estimation for low SNR conditions
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ... -
Efficient and Fair Throughput-Optimal Scheduling in Buffer-Aided Relay-Based Cellular Networks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)In this letter, we study throughput-optimal scheduling policies in single-path buffer-aided relay networks, where the packets of a user travel one fixed path from the source to the destination and do not require routing. ... -
Scalable real-time energy-efficient EEG compression scheme for wireless body area sensor network
( Elsevier Ltd , 2015 , Article)Recent technological advances in wireless body sensor networks have made it possible for the development of innovative medical applications to improve health care and the quality of life. By using miniaturized wireless ... -
Power-optimal feedback-based random spectrum access for an energy harvesting cognitive user
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)In this paper, we study and analyze cognitive radio networks in which secondary users (SUs) are equipped with energy harvesting (EH) capability. We design a random spectrum sensing and access protocol for the SU that ... -
Buffer-aided relaying improves both throughput and end-to-end delay
( Springer International Publishing , 2015 , Article)Buffer-aided relaying has recently attracted a lot of attention due to the improvement in the system throughput. However, a side effect usually deemed is that buffering at relay nodes results in the increase of packet ... -
Cognitive Radio Networks with Probabilistic Relaying: Stable Throughput and Delay Tradeoffs
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)This paper studies fundamental throughput and delay tradeoffs in cognitive radio systems with cooperative secondary users. We focus on randomized cooperative policies, whereby the secondary user (SU) serves either its own ... -
On the effect of proportional fairness in energy transfer for wireless powered communication networks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Wireless powered communication network (WPCN) is an emerging area of research where energy is transferred from the access point to the mobile terminals in the downlink and information is transferred in the uplink. In the ... -
Channel secondary random process for robust secret key generation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ... -
Estimating the number of sources: An efficient maximization approach
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ... -
Comparative simulation for physical layer key generation methods
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ... -
A simple cross correlation switched beam system (XSBS) for angle of arrival estimation
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)We propose a practical, simple and hardware friendly, yet novel and efficient, angle of arrival (AoA) estimation system. Our intuitive, two-phases cross-correlation-based system requires a switched beam antenna array with ... -
Light-weight encryption of wireless communication for implantable medical devices using henon chaotic system
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Implantable Medical Devices (IMDs) are a growing industry regarding personal health care and monitoring. In addition, they provide patients with efficient treatments. In general, these devices use wireless communication ... -
Robust secret key extraction from channel secondary random process
( John Wiley and Sons Ltd , 2016 , Conference Paper)The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ... -
Utility-based efficient dynamic distributed resource allocation in buffer-aided relay-assisted OFDMA networks
( Springer International Publishing , 2015 , Article)In this paper, we study resource allocation in buffer-aided relay-assisted OFDMA networks. We consider utility-based stochastic optimization framework where there are constraints to be met either instantaneously or in ... -
An evolutionary game theoretic approach for cooperative spectrum sensing
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Many spectrum sensing techniques have been proposed to allow a secondary user (SU) to utilize a primary user's (PU) spectrum through opportunistic access. However, few of them have considered the tradeoff between accuracy ... -
A cooperative Q-learning approach for distributed resource allocation in multi-user femtocell networks
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)This paper studies distributed interference management for femtocells that share the same frequency band with macrocells. We propose a multi-agent learning technique based on distributed Q-learning, called subcarrier-based ... -
Multimodal deep learning approach for Joint EEG-EMG Data compression and classification
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)In this paper, we present a joint compression and classification approach of EEG and EMG signals using a deep learning approach. Specifically, we build our system based on the deep autoencoder architecture which is designed ...