By Topic

# IET Communications

## Filter Results

Displaying Results 1 - 25 of 25
• ### Parallel combinatory multicarrier modulation in underwater acoustic communications

Publication Year: 2017, Page(s):1331 - 1337
| | PDF (2505 KB)

Parallel combinatory multicarrier (PCMC) modulation is a generalisation of the legacy multicarrier frequency shift keying (FSK) scheme, where for each group of M subcarriers, more than one (say L) subcarriers are chosen for simultaneous transmission. The PCMC scheme provides an effective way to increase the spectral efficiency while maintaining non-coherent detection at the receiver.... View full abstract»

• ### Energy-efficient relaying technique for two-hop diamond networks

Publication Year: 2017, Page(s):1338 - 1345
| | PDF (4922 KB)

Energy-efficiency (EE) is a critical metric in many types of wireless networks and is getting increasingly important for new technologies. In this paper, the authors propose an energy-efficient decode-and-forward relaying strategy for two-hop diamond networks where the source-destination communication is established by the help of two relays which have an inter-relay link. The inter-relay link giv... View full abstract»

• ### Link to system interfacing for multiple input and multiple output wireless system using maximum likelihood receiver

Publication Year: 2017, Page(s):1346 - 1351
| | PDF (3290 KB)

In this study an accurate method of link to system (L2S) interfacing for multiple input and multiple output system with a maximum likelihood (ML) receiver is proposed. L2S interfacing is used in system level simulation in order to predict the receiver link level performance using lookup tables. L2S interfacing normally uses signal to noise ratio (SNR) values at each received symbol for calculating... View full abstract»

• ### Performance analysis of random beamforming for multiuser spectrum sharing networks

Publication Year: 2017, Page(s):1352 - 1364
| | PDF (2201 KB)

This study analyses a comprehensive performance of multiuser spectrum sharing networks using random beamforming (RBF). In the considered cognitive radio (CR) system, a secondary broadcast station (SBS) coexisting with a pair of primary transceivers broadcasts the information to multiple secondary users. The authors first consider that the CR-RBF system does not undergo interference from the primar... View full abstract»

• ### Multi-rate combination of partial information-based routing and adaptive modulation and coding for space deterministic delay/disruption tolerant networks

Publication Year: 2017, Page(s):1365 - 1370
| | PDF (3043 KB)

Delay/disruption tolerant network (DTN), in which the network connectivity is intermittent and the node buffer size is limited, is a promising approach to model space networks. In this study, the authors focus on the space deterministic DTNs whose mobility and connectivity are predictable. A rate adaptation scheme based on adaptive modulation and coding (AMC) is adopted. Based on the analysis of d... View full abstract»

• ### Anti-eavesdropping FrFT-OFDM system exploiting multipath channel characteristics

Publication Year: 2017, Page(s):1371 - 1378
| | PDF (1921 KB)

This study exploits wireless channel response and fractional Fourier transform (FrFT) to achieve anti-eavesdropping downlink transmission over a multipath channel. The proposed system works in time-division duplexing mode, and only the transmitter knows the main channel response through uplink services. With the use of the main channel information, a time-varying spread-spectrum orthogonal frequen... View full abstract»

• ### Symbol error rate of QO-STBC based decode-and-forward cooperative communication system over generalised ${\bi \eta }$η–${\bi \mu }$μ and ${\bi \kappa }$κ–${\bi \mu }$μ fading channels

Publication Year: 2017, Page(s):1379 - 1386
| | PDF (1997 KB)

In this study, the authors derive the closed form expressions for symbol error rate (SER) of a quasi-orthogonal spacetime block code (QO-STBC) based multi-relay cooperative communication system using M-ary phase-shift keying (M-PSK) modulation over generalised κ-μ fading channel. For the same system over η-μ fading channel, due to the unobtainability of the closed form ... View full abstract»

• ### Hop-by-hop Relay Selection strategy for multi-hop relay networks with imperfect CSI

Publication Year: 2017, Page(s):1387 - 1395
| | PDF (3079 KB)

A hop-by-hop relay selection (RS) strategy for multi-hop decode-and-forward cooperative relay networks referred to as Max-DS is proposed. In this method, RS in each stage is only based on the channel state information (CSI) to relays in the next stage. In each stage, relays that successfully receive and decode the message from the previous stage form the candidate set for relaying, and amon... View full abstract»

• ### Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network

Publication Year: 2017, Page(s):1396 - 1406
| | PDF (2818 KB)

This study evaluates the intercept and outage probability of a decode-and-forward (DF) underlay cognitive radio network. The secondary users are subject to interference limitations from the primary network, with an eavesdropper tapping the second hop of cognitive network, when all the links undergo Rayleigh fading. For this threshold-based system, without assuming that the DF relays can always dec... View full abstract»

• ### Multiple channel error-correction algorithms for LCC decoding of Reed-Solomon codes and its high-speed architecture design

Publication Year: 2017, Page(s):1407 - 1415
| | PDF (3919 KB)

Reed-Solomon (RS) code is one of the most widely used error control codes. The decoding algorithms of RS code can be briefly divided into hard-decision decoding (HDD) and algebraic soft-decision decoding (ASD). However, traditional RS decoding algorithms perform unsatisfactorily over bursty channel. Therefore, many modified RS decoding algorithms utilised in bursty channel decoding were proposed. ... View full abstract»

• ### Performance of 1-D and 2-D OCDMA systems in presence of atmospheric turbulence and various weather conditions

Publication Year: 2017, Page(s):1416 - 1422
| | PDF (2236 KB)

In this study, the authors compare the performance of one-dimensional (1D) and two-dimensional (2D) optical code division multiple access (OCDMA) systems in presence of turbulence and various weather conditions. Lognormal fading model is used for analysis of weak turbulence and gamma-gamma model for moderate and strong turbulence. It is observed that presence of moderate and strong turbulence may ... View full abstract»

• ### Battery-friendly scheduling policy in MAC layer for WBAN data packets transmission

Publication Year: 2017, Page(s):1423 - 1430
| | PDF (3928 KB)

Energy consumption is a critical issue for battery-powered sensor nodes in wireless body area networks (WBANs). Many energy-efficient medium access control (MAC) protocols have been proposed and investigated for energy-constrained WBANs. These protocols assume that the battery has an ideal linear model. However, in practical application, the battery model is non-linear. When the lithium (Li)-ion b... View full abstract»

• ### Physical-layer security in Internet of Things based on compressed sensing and frequency selection

Publication Year: 2017, Page(s):1431 - 1437
| | PDF (2937 KB)

Information security is a vital concern in Internet of Things (IoT). Traditional security method based on public or private key encryption scheme is limited by the trade-off between low cost and high level of security. Among different security solutions, utilising compressed sensing (CS) in combination with the physical-layer security to achieve the security is a remarkable method. However, in the... View full abstract»

• ### Delay model of multicast protocols co-existing with legacy unicast in IEEE 802.11 wireless local area network

Publication Year: 2017, Page(s):1438 - 1445
| | PDF (4317 KB)

Reliable and QoS-aware multimedia delivery is one of the most important requirements to satisfy end user needs. IEEE 802.11 networks have become one of the most popular Internet access methods owing to their low-cost and fast connection speed. Multicasting is a transmission technique that can significantly increase network efficiency through the simultaneous delivery of the same multimedia content... View full abstract»

• ### Research on joint segment optimisation and stereo matching

Publication Year: 2017, Page(s):1446 - 1453
| | PDF (4140 KB)

Image segments are often used as a constraint in stereo matching. However, both over-segmentation and under-segmentation can lead to disparity degradation in some regions. To obtain an accurate disparity map, a modified semi-global matching (SGM) algorithm is proposed which is based on adaptive window models. Introducing the object notion and build a new global energy function to optimise segments... View full abstract»

• ### Capacity analysis for multi-antenna dual-hop AF system with random co-channel interference

Publication Year: 2017, Page(s):1454 - 1465
| | PDF (2877 KB)

In this work, the performance of a dual-hop amplify-and-forward (AF) multi-antenna relaying system over Rayleigh fading channels with random co-channel interference (CCI) is investigated. Three receiving strategies such as the maximal-ratio combining (MRC), zero-forcing (ZF) and minimum mean square error (MMSE) are employed in the relay to mitigate the impact of CCI which follows a Poisson point p... View full abstract»

• ### Multi user MIMO-OFDM-based power line communication structure with hardware impairments and crosstalk

Publication Year: 2017, Page(s):1466 - 1476
| | PDF (3952 KB)

Broadband power line communication (BPLC) provides high speed data services without requiring the installation of new infrastructure. Multiple-input-multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) technology can significantly improve the BPLC performance. In this study a new multi-user (MU) MIMO-OFDM structure for BPLC is proposed. The effects of physical hardware impairment... View full abstract»

• ### LR algorithm based on MED for multi-input–multi-output LDs

Publication Year: 2017, Page(s):1477 - 1484
| | PDF (2131 KB)

Recently, lattice reduction (LR)-aided linear detectors (LDs) are shown to be very effective in multi-input-multi-output systems for low-complexity and small bit-error-rate (BER) performance. However, the LR algorithms in the previous LR-aided LDs mainly aim to improve the orthogonality of the channel matrix where only channel state information is used. In this study, the authors design a novel LR... View full abstract»

• ### Max–min fairness based linear transceiver–relay design for MIMO interference relay channel

Publication Year: 2017, Page(s):1485 - 1496
| | PDF (4704 KB)

In this work, the authors investigate a multi-user multi-input multi-output (MIMO) interference relay system, where several transmitter nodes simultaneously communicate with their respective receiver nodes through half-duplex MIMO amplify and forward (AF) relay nodes. For this system configuration, they address the problem of linear transceiver-relay design to achieve max-min fairness among all th... View full abstract»

• ### Generalised error analysis of FRFT-OFDM over Nakagami-m fading channel with arbitrary m

Publication Year: 2017, Page(s):1497 - 1502
| | PDF (2550 KB)

In this study, generalised expression of probability of error (re) for binary phase shift keying (BPSK) and quadrature PSK (QPSK) modulated fractional Fourier transform (FRFT)-based orthogonal frequency division multiplexing (OFDM) system has been derived over frequency selective Nakagami-m fading channel for any arbitrary Nakagami parameter m in the presence of carrier frequency offset (CFO). The... View full abstract»

• ### Using Stackelberg game to enhance cognitive radio sensor networks security

Publication Year: 2017, Page(s):1503 - 1511
| | PDF (4546 KB)

The authors propose a game-theoretic approach using the Stackelberg game for securing cognitive radio sensor network (CRSN) against the spectrum sensing data falsification attack; this attack aims at corrupting the spectrum decisions communicated from the ambient sensor nodes (ASNs) to the fusion centre by imposing interference power. The proposed game approach is developed for two different attac... View full abstract»

• ### Improving the performance of cellular uplinks via power overbooking

Publication Year: 2017, Page(s):1512 - 1518
| | PDF (2244 KB)

The problem of uplink grant under-utilisation, which impacts third generation cellular system performance, is now also emerging in fourth and fifth generation systems, with the introduction of fast uplink access. This study addresses the problem of grant under-utilisation in third generation systems, where these effects are known to be highly significant. Such under-utilisation occurs since mobile... View full abstract»

• ### POCs- and uniform description of interference-based routing metric design for MG WMNs

Publication Year: 2017, Page(s):1519 - 1526
| | PDF (3059 KB)

In this study, routing metric design for multi-gateway (MG) wireless mesh networks (WMNs) where partially overlapped channels (POCs) are used for data transmissions is investigated. POCs, multiple gateways and routing are effective solutions for capacity improvement in WMNs. Previous research designs routing metrics for WMNs where only orthogonal channels (OCs) are used. As interference estimation... View full abstract»

• ### Performance of selective cooperation for underlay cognitive radio with multiple primary transmitters and receivers

Publication Year: 2017, Page(s):1527 - 1534
| | PDF (2762 KB)

The performance of an underlay cognitive radio network equipped with multiple decode-and-forward relays is investigated in the presence of multiple primary transmitters and multiple primary receivers. The allowed maximum transmission powers for the secondary nodes are obtained according to the outage constraint of multiple primary users (PUs). The authors study selective cooperation scheme for the... View full abstract»

• ### Defence against primary user emulation attack using statistical properties of the cognitive radio received power

Publication Year: 2017, Page(s):1535 - 1542
| | PDF (1678 KB)

Cognitive radio (CR) is proposed to solve the spectrum scarcity problem. One of the significant issues which arises recently in CR networks is security threats. Most of the proposed methods to defend against the attacks need the previous knowledge about the system. In this study, the authors use the statistical characteristics of the users to address one of the important kinds of attacks called pr... View full abstract»

## Aims & Scope

IET Communications covers the theory and practice of systems, networks and applications involving line, mobile radio, satellite and optical technologies for telecommunications, and Internet and multimedia communications.

Full Aims & Scope

## Meet Our Editors

IET Research Journals
iet_com@theiet.org