This paper addresses the study of a fading-rejection algorithm based on joint spectrum and antenna selection in a vehicle-to-vehicle (V2V) multiple antenna system. The central objective of this selective scheme is to provide resilience against the destructive effects of the superposition of line-of-sight (LOS) and ground-reflected signals. The paper also provides an extension to channels that combine such deter...
The future of goods transportation will rely on increased efficiency, lower risks, and diminished delays through the use of vehicle platoons that benefit from vehicular connectivity using V2X (Vehicle to Everything) applications. This article describes a system that offers the aforementioned vehicular connectivity to platoons, based on AI-enhanced 5G for resource allocation in wireless platoon intra-communicati...
This work presents the performance analysis of space-time block codes (STBCs) for vehicle-to-vehicle (V2V) fast-fading channels in scenarios with modified line-of-sight (LOS). The objective is to investigate how the V2V MIMO (multiple-input multiple-output) system performance is influenced by two important impairments: deterministic ground reflections and an increased Doppler frequency (time-variant channels). ...
This paper investigates backlog retransmission strategies for a class of random access protocols with retransmission diversity (i.e., network diversity multiple access or NDMA) combined with multiple-antenna-based multi-packet reception (MPR). This paper proposes NDMA-MPR as a candidate for 5G contention-based and ultra-low latency multiple access. This proposal is based on the following known features of NDMA-...
Superimposed training (ST) technique can be used at primary users’ transmitters to improve parameter estimation tasks (e.g. channel estimation) at primary users’ receivers. Since ST adds the training sequence to the data sequence the total available bandwidth is used for data transmission. The exploitation of the ST sequence in the context of cognitive radio networks leads to a significant increase in the detec...
This paper presents a new approach for the analysis and characterization of the throughput region of wireless random access protocols enabled with multi-packet reception (MPR) capabilities. The derivation of a closed-form expression for the envelope of the throughput region under the assumption of an arbitrary number of terminals is an open issue in the literature. To partially fill this gap, a new method based...
This paper describes the design of an active flow control (AFC) system for aeronautics applications based on dense wireless sensor and actuator networks (WSANs). The objective of this AFC system is to track gradients of pressure (or wall shear stress) across the surface of the fuselage of commercial aircraft. This collected information is used to activate a set of actuators that will attempt to reduce the skin ...
This paper presents the objectives and architecture of the use case of secure wireless avionics intracommunications of the European Project SCOTT (secure connected trustable things). SCOTT aims to build trust of the Internet of Things (IoT) in industrial applications. SCOTT addresses multiple issues such as security, safety, privacy, and dependability across 5 industrial domains: automotive, aeronautics, railwa...
This paper addresses the performance analysis of an adaptive wireless link with one antenna transmitter and a multiple antenna maximum-ratio combining (MRC) receiver. Two main assumptions are used in this paper: (1) Rayleigh fading correlated channels (i.e., MRC branch correlation) and (2) imperfect (outdated) channel state information at the transmitter (CSIT) side. he main contribution of this work lies in th...
—This paper presents a resource allocation algorithm for multi-user wireless networks affected by co-channel interference. The analysis considers a network with one base station (BS) that uses a multiple antenna transmitter (beamformer) to schedule (in a time-division manner) transmissions towards a set of J one-antenna terminals in the presence of K persistent interferers. The transmitter is assumed to employ ...