- Cooperative Communication and Network Coding
- Wireless Communication Security Techniques
- Energy Harvesting in Wireless Networks
- Advanced MIMO Systems Optimization
- Mobile Ad Hoc Networks
- Error Correcting Code Techniques
- Wireless Networks and Protocols
- Wireless Communication Networks Research
- Advanced Wireless Network Optimization
- Underwater Vehicles and Communication Systems
- Advanced Wireless Communication Techniques
- Opportunistic and Delay-Tolerant Networks
- Cellular Automata and Applications
- Energy Efficient Wireless Sensor Networks
- DNA and Biological Computing
- Wireless Power Transfer Systems
- Full-Duplex Wireless Communications
- Cognitive Radio Networks and Spectrum Sensing
- Indoor and Outdoor Localization Technologies
- Neural Networks and Applications
- Algorithms and Data Compression
- Machine Learning in Healthcare
- Advanced Wireless Communication Technologies
- Age of Information Optimization
- Distributed Sensor Networks and Detection Algorithms
National University of Singapore
2016-2025
Data Storage Institute
2024
University of Illinois Urbana-Champaign
2018-2021
Deakin University
2019
University of California, Berkeley
2015
University of Waterloo
2015
Princeton University
2013
Institute for Infocomm Research
2003-2007
Cornell University
1999-2002
Of late, there has been an avalanche of cross-layer design proposals for wireless networks. A number researchers have looked at specific aspects network performance and, approaching via their interpretation what it implies, presented several proposals. These involve different layers the protocol stack, and address both cellular ad hoc There also work relating to implementation interactions. It is high time that these various individual efforts be put into perspective a more holistic view...
This paper investigates price-based resource allocation strategies for two-tier femtocell networks, in which a central macrocell is underlaid with distributed femtocells, all operating over the same frequency band. Assuming that base station (MBS) protects itself by pricing interference from users, Stackelberg game formulated to study joint utility maximization of and femtocells subject maximum tolerable power constraint at MBS. Two practical network models are investigated: sparsely...
Estimating power system states accurately is crucial to the reliable operation of grids. Traditional weighted least square (WLS) state estimation methods face rising threat cyber-attacks, such as false data injection attacks, which can pass bad detection process in WLS estimation. In this paper, we propose a new method detect attacks by tracking dynamics measurement variations. The Kullback-Leibler distance (KLD) used calculate between two probability distributions derived from When are...
<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> In this correspondence, we derive a simplified description of the Han–Kobayashi rate region for general interference channel. Using result, establish that recently discovered Chong–Motani–Garg is new representation region. Moreover, tighter bound cardinality time-sharing auxiliary random variable emerges from our description. </para>
People often seek information by asking other people even when they have access to vast reservoirs of such as the Internet and libraries. This is because are great sources unique information, especially that which location-specific, community-specific time-specific. Social networking effective this type not easily available anywhere else. In paper, we conceive a wireless virtual social network mimics way via networking. PeopleNet simple, scalable low-cost architecture for efficient search in...
In many delay tolerant applications, information is opportunistically exchanged between mobile devices who encounter each other. order to effect such exchange, must have knowledge of other in their vicinity. We consider scenarios which there no infrastructure and probe environment discover devices. This can be an extremely energy consuming process highlights the need for conscious contact probing mechanisms. If very infrequently, they might miss contacts. On hand, frequent inefficient. this...
The choice of network architecture for body sensor networks is an important one because it significantly affects overall system design and performance. Current approaches use propagation models or specific medium access control protocols to study architectural choices. issue with the first approach that do not capture effects interference fading. Further, question can be raised without imposing a MAC protocol. In this paper, we evaluate star multihop topologies against goals, such as power...
Characterizing mobility or contact patterns in a campus environment is of interest for variety reasons. Existing studies these can be classified into two basic approaches - model based and measurement based. The approach involves constructing mathematical to generate movement while the measures locations proximity wireless devices infer patterns. In this paper, we take completely different approach. First obtain class schedules rosters from university-wide Intranet learning portal, use...
MAX is a system that facilitates human-centric search of the physical world. It allows humans to for and locate objects as when they need it instead organizing them priori. provides location information in form natural humans, i.e., with reference identifiable landmarks (e.g., on dining table) rather than precise coordinates. was designed following objectives: (i) operation, (ii) privacy, (iii) efficient any tagged object. In system, all objects, from documents clothing, can be people using...
Medium access control (MAC) protocols have been studied under different contexts for decades. In decentralized contexts, transmitter-receiver pairs make independent decisions, which are often suboptimal due to insufficient knowledge about the communication environment. this paper, we introduce distributed information sharing (DISH), is a flavor of control-plane cooperation, as new approach wireless protocol design. The basic idea allow nodes share with each other such that can more informed...
Unlike terrestrial wireless communication which uses radio waves, underwater relies on acoustic waves. The long latency and limited bandwidth pose great challenges in Media Access Control (MAC) protocol design. As a result, MAC protocols perform inefficiently when deployed directly an environment. In this paper, we examine how existing asynchronous handshaking based called Multiple Collision Avoidance (MACA) can be adapted for use multi-hop networks. Three areas of improvement are...
Propagation delays in underwater acoustic networks can be large as compared to the packet size. Conventional medium-access control (MAC) protocol design for such focuses on mitigation of impact propagation delay. Most proposed protocols date achieve, at best, a throughput similar that zero delay scenario. In this paper, we systematically explore possibility exploited make far exceed without Under assumptions model single collision domain half-duplex unicast network, show upper bound an <i...
A compact, light-weight and low-power wireless vital signs monitoring system based on Wireless Body Area Network (WBAN) protocol has been developed. The system, VySys, includes two compact wearable biosensor devices for continuous capturing transmission, a gateway to relay the message collected from biosensors cloud, finally client apps access display stored data in cloud. Both can last 24 hours weigh less than 22 g 44 g, respectively.They consist of proprietary in-house bio-sensing...
This article performs a unified analysis of three coordinated multipoint (CoMP) transmission strategies in the downlink mmWave cellular networks, including fixed-number base station (BS) cooperation (FNC), fixed-region BS (FRC), and interference-aware (IAC). We first develop comprehensive framework for CoMP operation investigate network performance under Poisson point process (PPP) model together with spectrum. To show what fraction users achieve target reliability given signal to...
Inter-user interference is the in communication when several body sensor networks (BSNs) operate same vicinity. As BSN users congregate an area, due to concurrently communicating BSNs will increase, resulting poor performance. In this paper, we conduct a preliminary investigation of impact inter-user and investigate its behavior with respect parameters such as number rates at which these communicate. interference, seen reduce packet delivery ratio by almost 35% cases 8 or more high-rate...
As body sensor networks (BSNs) advance to fulfill the promise of continuous, non-intrusive, remote monitoring patients, it is important that we achieve efficient communication between energy constrained on-body sensors. An design choice which has significant impact on achieving this goal network architecture. Star architecture been natural for BSNs due short distances nodes. In paper, revisit by quantitatively studying choices using data from experiments conducted deploying nodes operating...
In this paper, we consider medium access control (MAC) protocol design for random-access cognitive radio (CR) networks. A two-level opportunistic spectrum strategy is proposed to optimize the system performance of secondary network and adequately protect operation primary network. At first level, users (SUs) maintain a sufficient detection probability avoid interference with (PUs), sensing time optimized total traffic rate allowed random when channel detected be available. second two MAC...
The underwater acoustic channel is fundamentally different from the terrestrial wireless channel. Its unique characteristics, such as slow propagation speed and small bit rate distance product, present both challenges opportunities for media access control (MAC) protocol design. In existing handshaking-based MAC protocols, each successful handshake only allows an initiating sender to transmit a single or multiple consecutive data packets its intended receiver. long delay environment, this...
In this paper, we consider the medium access control (MAC) protocol design for random cognitive radio network (CRN). Based on asynchronous spectrum sensing technique and RTS/CTS mechanism, a new MAC protocol, namely, cognitive-radio-based carrier sense with collision avoidance (CR-CSMA/CA) is proposed to coordinate channel of secondary as well protect operation primary network, which applies both single multiple models. Using G/G/1 queuing model consideration unsaturated saturated condition,...
Consider an energy-harvesting receiver that uses the same received signal both for decoding information and harvesting energy, which is employed to power its circuitry. In scenario where has limited battery size, a with bursty energy content may cause outage at receiver, since will drain during intervals low energy. this paper, we analyze subblock energy-constrained codes (SECCs), ensure sufficient carried within every duration. We consider discrete memoryless channels characterize SECC...
In emerging fifth generation and beyond wireless communication systems, nodes are expected to support information flows that freshness-sensitive, along with broadband traffic having high data rate requirements. Freshness-sensitive flows, where freshness is quantified by a metric called the age of (AoI), naturally assigned priority over resources. Motivated this, we consider long-term average throughput maximization in single user fading channel, subject constraints on AoI power, knowledge...
Chronic diseases typically require long-term management through healthy lifestyle practices and pharmacological intervention. Although efficacious treatments exist, disease control is often sub-optimal leading to chronic disease-related sequela. Poor can partially be explained by the ‘one size fits all’ approach. Precision medicine aims tailor individual. CURATE.AI a dosing optimisation platform that considers individual factors improve precision of drug therapies. has been validated in...
Medium access control (MAC) protocols have been studied under different contexts for several years now. In all these MAC protocols, nodes make independent decisions on when to transmit a packet and back-off from transmission. this paper, we introduce the notion of node cooperation into protocols. Cooperation adds new degree freedom which has not explored before. Specifically study design cooperative in an environment where each is equipped with single transceiver multiple channels choose...
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme protect from attacks while providing strict delay bound. The covering generated by our uses the minimum sending rate provide full for given set of flows. relationship between user and is then studied via simulation. When flows Poisson processes with same rate, m users O(log m). For Pareto traffic, show that converges constant when number goes infinity. Finally,...
In this paper, we consider the cooperative spectrum sensing problem for a cognitive radio (CR) mesh network, where secondary users (SUs) are allowed to share band which is originally allocated primary users' (PUs) network. We propose two new strategies, called amplify-and-relay (AR) and detect-and-relay (DR), aiming at improving detection performance with help of other eligible SUs so as agilely vacate channel network when neighboring PUs switch active state. AR DR strategies periodically...