Hung Tran
Mälardalen University College
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hung Tran.
global communications conference | 2011
Hung Tran; Trung Quang Duong; Hans-Jürgen Zepernick
Cognitive relaying is a promising technique to improve spectrum utilization in mobile networks. In this paper, we consider a scenario in which a secondary transmitter communicates with a secondary receiver by the help of a secondary relay. The secondary user should adjust its transmission power in order to not cause any harmful interference to the multiple primary users operating in the licensed spectrum. In this context, we investigate the end-to-end performance of cognitive relay networks in terms of outage probability and ergodic capacity over Nakagami-m fading channels. A closed-form expression for outage probability and an approximation for ergodic capacity are derived. Furthermore, the presented numerical examples illustrate the impact of the number of primary users on the performance of cognitive relay networks.
international symposium on wireless pervasive computing | 2010
Hung Tran; Trung Quang Duong; Hans-Jürgen Zepernick
In this paper, we investigate the average waiting time of packets with different priorities in cognitive radio networks (CRN) using a preemptive priority queuing system. Specifically, we consider two scenarios for CRN, the first with the secondary user (SU) sensing at the beginning of each time slot and the other with the SU having continues sensing ability. Our analysis shows that the average waiting time of packets for the SU does not only depend on the size of packets and arrival rate of the SU traffic but also depends on the arrival rate and size of packets from primary users (PU). Moreover, the results show that an SU with continuous sensing ability can utilize spectrum better than sensing at the beginning of each time slot.
Eurasip Journal on Wireless Communications and Networking | 2012
Hung Tran; Trung Quang Duong; Hans-Jürgen Zepernick
In this article, we analyze the packet transmission time in spectrum sharing systems where a secondary user (SU) simultaneously accesses the spectrum licensed to primary users (PUs). In particular, under the assumption of an independent identical distributed Rayleigh block fading channel, we investigate the effect of the peak interference power constraint imposed by multiple PUs on the packet transmission time of the SU. Utilizing the concept of timeout, exact closed-form expressions of outage probability and average packet transmission time of the SU are derived. In addition, employing the characteristics of the M/G/1 queuing model, the impact of the number of PUs and their peak interference power constraint on the stable transmission condition and the average waiting time of packets at the SU are examined. Moreover, we then extend the analysis for point-to-point to point-to-multipoint communications allowing for multiple SUs and derive the related closed-form expressions for outage probability and successful transmission probability for the best channel condition. Numerical results are provided to corroborate our theoretical results and to illustrate applications of the derived closed-form expressions for performance evaluation of cognitive radio networks.
international conference on signal processing and communication systems | 2014
Louis Sibomana; Hans-J ¨ urgen Zepernick; Hung Tran
In this paper, we consider a secondary network with simultaneous wireless information and power transfer in a spectrum sharing scenario. In particular, a secondary user (SU) transmitter communicates with multiple SU receivers (SU-Rxs) under the peak interference power constraint of the primary user receiver and the SU maximum transmit power limit. We apply a channel quality-based threshold and exploit opportunistic scheduling. Specifically, an SU-Rx with best channel condition among a set of SU-Rxs satisfying the threshold is scheduled for data transmission. The remaining SU-Rxs with channel condition below the threshold, harvest the radio frequency energy. Analytical expressions of the SU ergodic capacity, symbol error rate, throughput, and energy harvesting are obtained. An optimal threshold satisfying a given target outage probability is determined. Numerical results are provided to investigate the impact of different parameters on the secondary network performance.
IEEE Transactions on Vehicular Technology | 2016
Georges Kaddoum; Yogesh Nijsure; Hung Tran
In this paper, we propose a generalized code index modulation (CIM) technique for direct-sequence spread spectrum (DSSS) communication. In particular, at the transmitter, the bit stream is divided into blocks in which each block is divided into two subblocks: mapped and modulated subblocks. Thereafter, the bits within the mapped subblock are used to select one of the predefined spreading codes, which is then used to spread the modulated bits of the second subblock. In this design, using the spreading code index as an information-bearing unit increases the overall spectral efficiency of this system. At the receiver side, the spreading code index is first estimated, thus resulting in a direct estimation of mapped subblock bits. Consequently, the corresponding spreading code to this estimated index is used to despread the modulated symbol of the modulated subblock. Subsequently, mathematical expressions for bit error rate (BER), symbol error rate (SER), throughput, energy efficiency, and the system complexity are derived to analyze the system performance. Finally, simulation results show that the proposed modulation scheme can achieve a higher data rate than the conventional DSSS system, with lower energy consumption and complexity.
IEEE Communications Letters | 2013
Hung Tran; Hans-Jürgen Zepernick; Hoc Phan
In this letter, outage performance of cognitive cooperative radio networks using two decode-and-forward (DF) schemes is investigated. Subject to the joint outage constraint of the primary user and the peak transmit power constraint of the secondary user, adaptive power allocation policies for the secondary transmitter and secondary relays are studied. Based on these strategies, expressions for the outage probability of proactive and reactive DF schemes are obtained. Interestingly, our results show that an increase in the transmit power of the primary transmitter (PU-Tx) does not always degrade the performance of the secondary network. In fact, the PU-Tx transmit power is a substantial parameter that the secondary users can adapt to in order to improve the system performance. The numerical results additionally show that the performance of the reactive DF scheme outperforms the proactive DF scheme if the outage threshold in the first hop of the reactive DF scheme is less than that of the proactive scheme.
international symposium on wireless pervasive computing | 2011
Hung Tran; Trung Quang Duong; Hans-Jürgen Zepernick
In this paper, we study the effect of peak interference power constraint on outage probability and transmission time of packets for secondary user (SU) in a spectrum sharing environment. In the considered cognitive radio network scenario, a secondary user transmitter sends its packets over a Rayleigh fading channel. In combination with the analysis of time out characteristics, queueing models are deployed to evaluate average transmission time of packets, average waiting time of packets, and average number of packets waiting in the queue of the cognitive user.
international conference on wireless communications and mobile computing | 2013
Louis Sibomana; Hans-Jürgen Zepernick; Hung Tran; Charles Kabiri
In this paper, we investigate a downlink model for underlay cognitive radio networks (CRNs). In particular, we assume that the secondary transmitter (SU-Tx) sends common packets to secondary receivers (SU-Rx) under the outage constraint of a single primary user (PU) and the peak transmit power constraint of the SU-Tx. All channels undergo Rayleigh fading. Given these settings, an adaptive transmit power policy for the SU-Tx is considered. Moreover, the cumulative distribution function (CDF) and probability density function (PDF) for packet transmission time are derived to analyze the timeout probability, the average packet transmission time and the average time a packet spends in the system for the SU-Rx having the best channel condition. Numerical results are provided to investigate the impact of the PU transmit power and channel mean powers on secondary network performance. The results show that when the number of SU-Rx becomes large, the timeout probability and the packet average time in the system decrease to a minimum.
international conference on signal processing and communication systems | 2010
Hung Tran; Trung Quang Duong; Hans-Jürgen Zepernick
In this paper, we derive the probability density function and cumulative distribution function of packet transmission time in a spectrum sharing system. In combination with the time-out characteristics of packets, we further study the outage probability and average transmission time under peak power interference constraint over Nakagami-m fading channel. Especially, we employ the M/G/1 queuing model to calculate the average waiting time of packets and average number of packets waiting in the queue of a secondary user. The numerical results show the importance of the peak interference power constraint on the delay of packets at the secondary user.
global communications conference | 2014
Louis Sibomana; Hans-J ¨ urgen Zepernick; Hung Tran
This paper analyzes the physical layer security for cognitive relay networks under the peak interference power constraint of the primary user receiver. In particular, a secondary user (SU) transmitter communicates with an SU receiver through the help of multiple secondary relays (SRs) using a decode-and-forward (DF) protocol. There exist multiple eavesdroppers (EAVs) who illegally listen to the secondary network communication. We consider a reactive DF scheme, and only the SRs that satisfy a decoding threshold participate in the relay selection. Analytical expressions of the probability of existence of secrecy capacity and secrecy outage probability are obtained. Numerical results are provided to evaluate the impact of the number of SRs, number of EAVs and channel mean powers on the secondary system security. We also investigate the effect of the interference from the primary network to the secondary network performance. Moreover, the performance of proactive DF is analyzed for the purpose of comparison.