Nile University

Displaying 1-22 of 22 results

  • White Papers // May 2012

    A New Achievable DoF Region for the 3-User MXN Symmetric Interference Channel

    In this paper, the 3-user Gaussian MIMO interference channel with M antennas at each transmitter and N antennas at each receiver is considered. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. A novel scheme is presented that spans a new achievable degrees...

    Provided By Nile University

  • White Papers // May 2012

    On the Diversity Gain Region of the Z-Interference Channels

    In this paper, the authors analyze the Diversity Gain Region (DGR) of the single-antenna Rayleigh fading Z-Interference Channel (ZIC). More specifically, they characterize the achievable DGR of the fixed-power split Han-Kobayashi (HK) approach under these assumptions. Their characterization comes in a closed form and demonstrates that the HK scheme with...

    Provided By Nile University

  • White Papers // May 2012

    Degrees of Freedom for Separated and Non-Separated Half-Duplex Cellular MIMO Two-Way Relay Channels

    The authors study a cellular setting in which an introduced multiple-antenna Relay Station (RS) can possibly assist the bidirectional communication between a multiple-antenna Base Station (BS) and a set of single-antenna Mobile Stations (MSs). Through a proposed six-phase communication protocol with arbitrary number of antennas and MSs, they characterize the...

    Provided By Nile University

  • White Papers // Mar 2012

    Resource Allocation for Throughput Enhancement in Cellular Shared Relay Networks

    The downlink frame of a cellular relay network is considered, where a shared MIMO Decode-and-Froward relaying is used to serve the users at the edge of the cell. The relay employs zero-forcing beamforming to manage the interference among the Mobile Stations (MSs) at the edge of the cell. A non-cooperative...

    Provided By Nile University

  • White Papers // Mar 2012

    A Feedback-Based Access Scheme for Cognitive-Relaying Networks

    In this paper, the authors consider a cognitive relaying network in which the secondary user accesses the channel with a certain access probability that depends on the feedback information sent by the primary destination. In addition, the secondary user is granted relaying capabilities by which it can relay primary traffic...

    Provided By Nile University

  • White Papers // Mar 2012

    On the Role of Vehicular Mobility in Cooperative Content Caching

    In this paper, the authors analyze the performance of cooperative content caching in Vehicular Ad hoc NETworks (VANETs). In particular, they characterize, using analysis and simulations, the behavior of the probability of outage (i.e., not finding a requested data chunk at a neighbor) under freeway vehicular mobility. First, they introduce...

    Provided By Nile University

  • White Papers // Jan 2012

    DNIS - A Middleware for Dynamic Multiple Network Interfaces Scheduling

    Many of today's mobile devices are equipped with multiple network interfaces that can be used to connect to the Internet, including Ethernet, WiFi, 3G, and Bluetooth. However, current operating systems, such as Windows and Linux, typically choose only one of the available network interfaces and assign all the traffic to...

    Provided By Nile University

  • White Papers // Apr 2011

    SANC: Source Authentication Using Network Coding

    In this paper, the authors explore the security merits of network coding and potential trade-offs with the widely accepted throughput benefits, especially in multicast scenarios. In particular, they propose a novel Source Authentication using Network Coding (SANC) scheme that can either complement state-of-the-art application-layer authentication schemes proposed in the literature...

    Provided By Nile University

  • White Papers // Dec 2010

    On the Feasibility of Centrally-Coordinated Peer-to-Peer Live Streaming

    In this paper the authors present an exploration of central coordination as a way of managing P2P live streaming overlays. The main point is to show the elements needed to construct a system with that approach. A key element in the feasibility of this approach is a near real-time optimization...

    Provided By Nile University

  • White Papers // Sep 2010

    Admission and Power Control for Spectrum Sharing Cognitive Radio Networks

    The authors investigate the problem of admission and power control considering a scenario where licensed, or primary, users and cognitive radios, or secondary users, are transmitting concurrently over the same band. The primary users share a common receiver and the interference on this receiver from secondary users should be strictly...

    Provided By Nile University

  • White Papers // May 2010

    Propagation Modeling for Accurate Indoor WLAN RSS-Based Localization

    WLAN RSS-based localization has been a hot research topic for the last years. To obtain high accuracy in the noisy wireless channel, WLAN location determination systems usually use a calibration phase, where a radio map, capturing the signal strength signatures at different locations in the area of interest, is built....

    Provided By Nile University

  • White Papers // Mar 2010

    Cognitive Radio Transmission Strategies for Primary Erasure Channels

    A fundamental problem in cognitive radio systems is that the cognitive radio is ignorant of the primary channel state and the interference it inflicts on the primary license holder. In this paper, the authors assume that the primary transmitter sends packets across an erasure channel and the primary receiver employs...

    Provided By Nile University

  • White Papers // Mar 2010

    Joint Power and Transmission Duration Control for Un-Slotted Cognitive Radio Networks

    The authors consider an unslotted primary channel with alternating on/off activity and provide a solution to the problem of finding the optimal secondary transmission power and duration given some sensing outcome. The goal is to maximize a weighted sum of the primary and secondary throughput where the weight is determined...

    Provided By Nile University

  • White Papers // Mar 2010

    Multiuser MIMO Relaying Under Quality of Service Constraints

    The authors consider a wireless communication scenario with K source-destination pairs communicating through several half-duplex relays that amplify the signals received from the sources and forward them to the destination nodes. They jointly design the relay beamforming matrices by minimizing the total power transmitted from the relays subject to a...

    Provided By Nile University

  • White Papers // Nov 2009

    Design and Implementation of Low-Power Viterbi Decoder for Software-Defined WiMAX Receiver

    Many sophisticated signal processing tasks are performed in SDR that can be implemented on FPGA, including advanced compression algorithms, channel estimation, power control, forward error control, synchronization, equalization, and protocol management, etc. Channel coding may be considered as one of the most challenging signal-processing tasks performed in SDR. Most digital...

    Provided By Nile University

  • White Papers // Nov 2009

    New Achievable Secrecy Rate Regions for the Two Way Wiretap Channel

    In this paper, the authors develop new achievable rate regions for the two way wiretap channel. In their setup, Alice and Bob wish to exchange messages securely in the presence of a passive eavesdropper Eve. In the full-duplex scenario, their achievability argument relies on allowing the two users to jointly...

    Provided By Nile University

  • White Papers // Nov 2009

    Power and Transmission Duration Control for Un-Slotted Cognitive Radio Networks

    The authors consider an unslotted primary channel with alternating on/off activity and provide a solution to the problem of finding the optimal secondary transmission power and duration given some sensing outcome. The goal is to maximize a weighted sum of the primary and secondary throughput where the weight is determined...

    Provided By Nile University

  • White Papers // Jul 2009

    Cognitive MAC Protocols for General Primary Network Models

    The authors consider the design of cognitive Medium Access Control (MAC) protocols enabling a secondary (unlicensed) transmitter-receiver pair to communicate over the idle periods of a set of primary (licensed) channels. More specifically, they propose cognitive MAC protocols optimized for both slotted and un-slotted primary networks. For the slotted structure,...

    Provided By Nile University

  • White Papers // May 2009

    WinBioinfTools: Bioinformatics Tools for Windows High Performance Computing Server 2008

    Open source bioinformatics tools running under MS Windows are rare to find, and those running under Windows HPC cluster are almost non-existing. This is despite the fact that the Windows is the most popular operating system used among life scientists. Therefore, the authors introduce in this initiative WinBioinfTools, a toolkit...

    Provided By Nile University

  • White Papers // Nov 2008

    MyP2PWorld: Highly Reproducible Application-Level Emulation of P2P Systems

    In this paper, the authors describe an application-level emulator for P2P systems with a special focus on high reproducibility. They achieve reproduciblity by taking control over the scheduling of concurrent events from the operating system. The authors accomplish that for inter- and intra-peer concurrency. The development of the system was...

    Provided By Nile University

  • White Papers // Oct 2008

    Smart Devices for Smart Environments: Device-Free Passive Detection in Real Environments

    Device-free Passive (DfP) localization is a system envisioned to detect, track, and identify entities that do not carry any device, nor participate actively in the localization process. A DfP system allows using nominal WiFi equipment for intrusion detection, without using any extra hardware, adding smartness to any WiFi-enabled device. In...

    Provided By Nile University

  • White Papers // Oct 2008

    Linearly Constrained Minimum Variance Cooperative Relay Beamforming for Multiuser Wireless Networks: A Convex Optimization Approach

    In this paper, the authors develop a beamforming algorithm for multiuser Multiple Input-Multiple Output (MIMO) cooperative relaying wireless systems. They consider a relaying scenario with multiple sources transmitting to one or more destination nodes through several relay terminals. Each relay is equipped with multiple antennas. They jointly design the beamforming...

    Provided By Nile University

  • White Papers // May 2012

    A New Achievable DoF Region for the 3-User MXN Symmetric Interference Channel

    In this paper, the 3-user Gaussian MIMO interference channel with M antennas at each transmitter and N antennas at each receiver is considered. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. A novel scheme is presented that spans a new achievable degrees...

    Provided By Nile University

  • White Papers // May 2012

    On the Diversity Gain Region of the Z-Interference Channels

    In this paper, the authors analyze the Diversity Gain Region (DGR) of the single-antenna Rayleigh fading Z-Interference Channel (ZIC). More specifically, they characterize the achievable DGR of the fixed-power split Han-Kobayashi (HK) approach under these assumptions. Their characterization comes in a closed form and demonstrates that the HK scheme with...

    Provided By Nile University

  • White Papers // May 2012

    Degrees of Freedom for Separated and Non-Separated Half-Duplex Cellular MIMO Two-Way Relay Channels

    The authors study a cellular setting in which an introduced multiple-antenna Relay Station (RS) can possibly assist the bidirectional communication between a multiple-antenna Base Station (BS) and a set of single-antenna Mobile Stations (MSs). Through a proposed six-phase communication protocol with arbitrary number of antennas and MSs, they characterize the...

    Provided By Nile University

  • White Papers // Mar 2012

    A Feedback-Based Access Scheme for Cognitive-Relaying Networks

    In this paper, the authors consider a cognitive relaying network in which the secondary user accesses the channel with a certain access probability that depends on the feedback information sent by the primary destination. In addition, the secondary user is granted relaying capabilities by which it can relay primary traffic...

    Provided By Nile University

  • White Papers // Nov 2009

    New Achievable Secrecy Rate Regions for the Two Way Wiretap Channel

    In this paper, the authors develop new achievable rate regions for the two way wiretap channel. In their setup, Alice and Bob wish to exchange messages securely in the presence of a passive eavesdropper Eve. In the full-duplex scenario, their achievability argument relies on allowing the two users to jointly...

    Provided By Nile University

  • White Papers // Mar 2012

    Resource Allocation for Throughput Enhancement in Cellular Shared Relay Networks

    The downlink frame of a cellular relay network is considered, where a shared MIMO Decode-and-Froward relaying is used to serve the users at the edge of the cell. The relay employs zero-forcing beamforming to manage the interference among the Mobile Stations (MSs) at the edge of the cell. A non-cooperative...

    Provided By Nile University

  • White Papers // Apr 2011

    SANC: Source Authentication Using Network Coding

    In this paper, the authors explore the security merits of network coding and potential trade-offs with the widely accepted throughput benefits, especially in multicast scenarios. In particular, they propose a novel Source Authentication using Network Coding (SANC) scheme that can either complement state-of-the-art application-layer authentication schemes proposed in the literature...

    Provided By Nile University

  • White Papers // May 2009

    WinBioinfTools: Bioinformatics Tools for Windows High Performance Computing Server 2008

    Open source bioinformatics tools running under MS Windows are rare to find, and those running under Windows HPC cluster are almost non-existing. This is despite the fact that the Windows is the most popular operating system used among life scientists. Therefore, the authors introduce in this initiative WinBioinfTools, a toolkit...

    Provided By Nile University

  • White Papers // Jul 2009

    Cognitive MAC Protocols for General Primary Network Models

    The authors consider the design of cognitive Medium Access Control (MAC) protocols enabling a secondary (unlicensed) transmitter-receiver pair to communicate over the idle periods of a set of primary (licensed) channels. More specifically, they propose cognitive MAC protocols optimized for both slotted and un-slotted primary networks. For the slotted structure,...

    Provided By Nile University

  • White Papers // Nov 2009

    Power and Transmission Duration Control for Un-Slotted Cognitive Radio Networks

    The authors consider an unslotted primary channel with alternating on/off activity and provide a solution to the problem of finding the optimal secondary transmission power and duration given some sensing outcome. The goal is to maximize a weighted sum of the primary and secondary throughput where the weight is determined...

    Provided By Nile University

  • White Papers // Nov 2009

    Design and Implementation of Low-Power Viterbi Decoder for Software-Defined WiMAX Receiver

    Many sophisticated signal processing tasks are performed in SDR that can be implemented on FPGA, including advanced compression algorithms, channel estimation, power control, forward error control, synchronization, equalization, and protocol management, etc. Channel coding may be considered as one of the most challenging signal-processing tasks performed in SDR. Most digital...

    Provided By Nile University

  • White Papers // Dec 2010

    On the Feasibility of Centrally-Coordinated Peer-to-Peer Live Streaming

    In this paper the authors present an exploration of central coordination as a way of managing P2P live streaming overlays. The main point is to show the elements needed to construct a system with that approach. A key element in the feasibility of this approach is a near real-time optimization...

    Provided By Nile University

  • White Papers // Nov 2008

    MyP2PWorld: Highly Reproducible Application-Level Emulation of P2P Systems

    In this paper, the authors describe an application-level emulator for P2P systems with a special focus on high reproducibility. They achieve reproduciblity by taking control over the scheduling of concurrent events from the operating system. The authors accomplish that for inter- and intra-peer concurrency. The development of the system was...

    Provided By Nile University

  • White Papers // Jan 2012

    DNIS - A Middleware for Dynamic Multiple Network Interfaces Scheduling

    Many of today's mobile devices are equipped with multiple network interfaces that can be used to connect to the Internet, including Ethernet, WiFi, 3G, and Bluetooth. However, current operating systems, such as Windows and Linux, typically choose only one of the available network interfaces and assign all the traffic to...

    Provided By Nile University

  • White Papers // May 2010

    Propagation Modeling for Accurate Indoor WLAN RSS-Based Localization

    WLAN RSS-based localization has been a hot research topic for the last years. To obtain high accuracy in the noisy wireless channel, WLAN location determination systems usually use a calibration phase, where a radio map, capturing the signal strength signatures at different locations in the area of interest, is built....

    Provided By Nile University

  • White Papers // Oct 2008

    Smart Devices for Smart Environments: Device-Free Passive Detection in Real Environments

    Device-free Passive (DfP) localization is a system envisioned to detect, track, and identify entities that do not carry any device, nor participate actively in the localization process. A DfP system allows using nominal WiFi equipment for intrusion detection, without using any extra hardware, adding smartness to any WiFi-enabled device. In...

    Provided By Nile University

  • White Papers // Sep 2010

    Admission and Power Control for Spectrum Sharing Cognitive Radio Networks

    The authors investigate the problem of admission and power control considering a scenario where licensed, or primary, users and cognitive radios, or secondary users, are transmitting concurrently over the same band. The primary users share a common receiver and the interference on this receiver from secondary users should be strictly...

    Provided By Nile University

  • White Papers // Oct 2008

    Linearly Constrained Minimum Variance Cooperative Relay Beamforming for Multiuser Wireless Networks: A Convex Optimization Approach

    In this paper, the authors develop a beamforming algorithm for multiuser Multiple Input-Multiple Output (MIMO) cooperative relaying wireless systems. They consider a relaying scenario with multiple sources transmitting to one or more destination nodes through several relay terminals. Each relay is equipped with multiple antennas. They jointly design the beamforming...

    Provided By Nile University

  • White Papers // Mar 2010

    Joint Power and Transmission Duration Control for Un-Slotted Cognitive Radio Networks

    The authors consider an unslotted primary channel with alternating on/off activity and provide a solution to the problem of finding the optimal secondary transmission power and duration given some sensing outcome. The goal is to maximize a weighted sum of the primary and secondary throughput where the weight is determined...

    Provided By Nile University

  • White Papers // Mar 2010

    Multiuser MIMO Relaying Under Quality of Service Constraints

    The authors consider a wireless communication scenario with K source-destination pairs communicating through several half-duplex relays that amplify the signals received from the sources and forward them to the destination nodes. They jointly design the relay beamforming matrices by minimizing the total power transmitted from the relays subject to a...

    Provided By Nile University

  • White Papers // Mar 2010

    Cognitive Radio Transmission Strategies for Primary Erasure Channels

    A fundamental problem in cognitive radio systems is that the cognitive radio is ignorant of the primary channel state and the interference it inflicts on the primary license holder. In this paper, the authors assume that the primary transmitter sends packets across an erasure channel and the primary receiver employs...

    Provided By Nile University

  • White Papers // Mar 2012

    On the Role of Vehicular Mobility in Cooperative Content Caching

    In this paper, the authors analyze the performance of cooperative content caching in Vehicular Ad hoc NETworks (VANETs). In particular, they characterize, using analysis and simulations, the behavior of the probability of outage (i.e., not finding a requested data chunk at a neighbor) under freeway vehicular mobility. First, they introduce...

    Provided By Nile University