Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hung Tran is active.

Publication


Featured researches published by Hung Tran.


global communications conference | 2011

Performance Analysis of Cognitive Relay Networks under Power Constraint of Multiple Primary Users

Hung Tran; Trung Quang Duong; Hans-Jürgen Zepernick

Cognitive relaying is a promising technique to improve spectrum utilization in mobile networks. In this paper, we consider a scenario in which a secondary transmitter communicates with a secondary receiver by the help of a secondary relay. The secondary user should adjust its transmission power in order to not cause any harmful interference to the multiple primary users operating in the licensed spectrum. In this context, we investigate the end-to-end performance of cognitive relay networks in terms of outage probability and ergodic capacity over Nakagami-m fading channels. A closed-form expression for outage probability and an approximation for ergodic capacity are derived. Furthermore, the presented numerical examples illustrate the impact of the number of primary users on the performance of cognitive relay networks.


international symposium on wireless pervasive computing | 2010

Average waiting time of packets with different priorities in cognitive radio networks

Hung Tran; Trung Quang Duong; Hans-Jürgen Zepernick

In this paper, we investigate the average waiting time of packets with different priorities in cognitive radio networks (CRN) using a preemptive priority queuing system. Specifically, we consider two scenarios for CRN, the first with the secondary user (SU) sensing at the beginning of each time slot and the other with the SU having continues sensing ability. Our analysis shows that the average waiting time of packets for the SU does not only depend on the size of packets and arrival rate of the SU traffic but also depends on the arrival rate and size of packets from primary users (PU). Moreover, the results show that an SU with continuous sensing ability can utilize spectrum better than sensing at the beginning of each time slot.


Eurasip Journal on Wireless Communications and Networking | 2012

Delay performance of cognitive radio networks for point-to-point and point-to-multipoint communications

Hung Tran; Trung Quang Duong; Hans-Jürgen Zepernick

In this article, we analyze the packet transmission time in spectrum sharing systems where a secondary user (SU) simultaneously accesses the spectrum licensed to primary users (PUs). In particular, under the assumption of an independent identical distributed Rayleigh block fading channel, we investigate the effect of the peak interference power constraint imposed by multiple PUs on the packet transmission time of the SU. Utilizing the concept of timeout, exact closed-form expressions of outage probability and average packet transmission time of the SU are derived. In addition, employing the characteristics of the M/G/1 queuing model, the impact of the number of PUs and their peak interference power constraint on the stable transmission condition and the average waiting time of packets at the SU are examined. Moreover, we then extend the analysis for point-to-point to point-to-multipoint communications allowing for multiple SUs and derive the related closed-form expressions for outage probability and successful transmission probability for the best channel condition. Numerical results are provided to corroborate our theoretical results and to illustrate applications of the derived closed-form expressions for performance evaluation of cognitive radio networks.


international conference on signal processing and communication systems | 2014

Wireless information and power transfer in an underlay cognitive radio network

Louis Sibomana; Hans-J ¨ urgen Zepernick; Hung Tran

In this paper, we consider a secondary network with simultaneous wireless information and power transfer in a spectrum sharing scenario. In particular, a secondary user (SU) transmitter communicates with multiple SU receivers (SU-Rxs) under the peak interference power constraint of the primary user receiver and the SU maximum transmit power limit. We apply a channel quality-based threshold and exploit opportunistic scheduling. Specifically, an SU-Rx with best channel condition among a set of SU-Rxs satisfying the threshold is scheduled for data transmission. The remaining SU-Rxs with channel condition below the threshold, harvest the radio frequency energy. Analytical expressions of the SU ergodic capacity, symbol error rate, throughput, and energy harvesting are obtained. An optimal threshold satisfying a given target outage probability is determined. Numerical results are provided to investigate the impact of different parameters on the secondary network performance.


IEEE Transactions on Vehicular Technology | 2016

Generalized Code Index Modulation Technique for High-Data-Rate Communication Systems

Georges Kaddoum; Yogesh Nijsure; Hung Tran

In this paper, we propose a generalized code index modulation (CIM) technique for direct-sequence spread spectrum (DSSS) communication. In particular, at the transmitter, the bit stream is divided into blocks in which each block is divided into two subblocks: mapped and modulated subblocks. Thereafter, the bits within the mapped subblock are used to select one of the predefined spreading codes, which is then used to spread the modulated bits of the second subblock. In this design, using the spreading code index as an information-bearing unit increases the overall spectral efficiency of this system. At the receiver side, the spreading code index is first estimated, thus resulting in a direct estimation of mapped subblock bits. Consequently, the corresponding spreading code to this estimated index is used to despread the modulated symbol of the modulated subblock. Subsequently, mathematical expressions for bit error rate (BER), symbol error rate (SER), throughput, energy efficiency, and the system complexity are derived to analyze the system performance. Finally, simulation results show that the proposed modulation scheme can achieve a higher data rate than the conventional DSSS system, with lower energy consumption and complexity.


IEEE Communications Letters | 2013

Cognitive Proactive and Reactive DF Relaying Schemes under Joint Outage and Peak Transmit Power Constraints

Hung Tran; Hans-Jürgen Zepernick; Hoc Phan

In this letter, outage performance of cognitive cooperative radio networks using two decode-and-forward (DF) schemes is investigated. Subject to the joint outage constraint of the primary user and the peak transmit power constraint of the secondary user, adaptive power allocation policies for the secondary transmitter and secondary relays are studied. Based on these strategies, expressions for the outage probability of proactive and reactive DF schemes are obtained. Interestingly, our results show that an increase in the transmit power of the primary transmitter (PU-Tx) does not always degrade the performance of the secondary network. In fact, the PU-Tx transmit power is a substantial parameter that the secondary users can adapt to in order to improve the system performance. The numerical results additionally show that the performance of the reactive DF scheme outperforms the proactive DF scheme if the outage threshold in the first hop of the reactive DF scheme is less than that of the proactive scheme.


international symposium on wireless pervasive computing | 2011

Queuing analysis for cognitive radio networks under peak interference power constraint

Hung Tran; Trung Quang Duong; Hans-Jürgen Zepernick

In this paper, we study the effect of peak interference power constraint on outage probability and transmission time of packets for secondary user (SU) in a spectrum sharing environment. In the considered cognitive radio network scenario, a secondary user transmitter sends its packets over a Rayleigh fading channel. In combination with the analysis of time out characteristics, queueing models are deployed to evaluate average transmission time of packets, average waiting time of packets, and average number of packets waiting in the queue of the cognitive user.


international conference on wireless communications and mobile computing | 2013

Packet transmission time for cognitive radio networks considering interference from primary user

Louis Sibomana; Hans-Jürgen Zepernick; Hung Tran; Charles Kabiri

In this paper, we investigate a downlink model for underlay cognitive radio networks (CRNs). In particular, we assume that the secondary transmitter (SU-Tx) sends common packets to secondary receivers (SU-Rx) under the outage constraint of a single primary user (PU) and the peak transmit power constraint of the SU-Tx. All channels undergo Rayleigh fading. Given these settings, an adaptive transmit power policy for the SU-Tx is considered. Moreover, the cumulative distribution function (CDF) and probability density function (PDF) for packet transmission time are derived to analyze the timeout probability, the average packet transmission time and the average time a packet spends in the system for the SU-Rx having the best channel condition. Numerical results are provided to investigate the impact of the PU transmit power and channel mean powers on secondary network performance. The results show that when the number of SU-Rx becomes large, the timeout probability and the packet average time in the system decrease to a minimum.


international conference on signal processing and communication systems | 2010

Performance of a spectrum sharing system over Nakagami-m fading channels

Hung Tran; Trung Quang Duong; Hans-Jürgen Zepernick

In this paper, we derive the probability density function and cumulative distribution function of packet transmission time in a spectrum sharing system. In combination with the time-out characteristics of packets, we further study the outage probability and average transmission time under peak power interference constraint over Nakagami-m fading channel. Especially, we employ the M/G/1 queuing model to calculate the average waiting time of packets and average number of packets waiting in the queue of a secondary user. The numerical results show the importance of the peak interference power constraint on the delay of packets at the secondary user.


global communications conference | 2014

On physical layer security for reactive DF cognitive relay networks

Louis Sibomana; Hans-J ¨ urgen Zepernick; Hung Tran

This paper analyzes the physical layer security for cognitive relay networks under the peak interference power constraint of the primary user receiver. In particular, a secondary user (SU) transmitter communicates with an SU receiver through the help of multiple secondary relays (SRs) using a decode-and-forward (DF) protocol. There exist multiple eavesdroppers (EAVs) who illegally listen to the secondary network communication. We consider a reactive DF scheme, and only the SRs that satisfy a decoding threshold participate in the relay selection. Analytical expressions of the probability of existence of secrecy capacity and secrecy outage probability are obtained. Numerical results are provided to evaluate the impact of the number of SRs, number of EAVs and channel mean powers on the secondary system security. We also investigate the effect of the interference from the primary network to the secondary network performance. Moreover, the performance of proactive DF is analyzed for the purpose of comparison.

Collaboration


Dive into the Hung Tran's collaboration.

Top Co-Authors

Avatar

Hans-Jürgen Zepernick

Blekinge Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Louis Sibomana

Blekinge Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Charles Kabiri

Blekinge Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hoc Phan

Blekinge Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Trung Quang Duong

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

Georges Kaddoum

École de technologie supérieure

View shared research outputs
Top Co-Authors

Avatar

Ha-Vu Tran

Université du Québec

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Elisabeth Uhlemann

Mälardalen University College

View shared research outputs
Researchain Logo
Decentralizing Knowledge