
Fifth generation (5G) and beyond5G (B5G) systems expect coverage and
capacity enhancements along with the consideration of limited power, cost and
spectrum. Densification of small cells (SCs) is a promising approach to cater
these demands of 5G and B5G systems. However, such an ultra dense network of
SCs requires provision of smart backhaul and fronthaul networks. In this paper,
we employ a scalable idea of using networked flying platforms (NFPs) as aerial
hubs to provide fronthaul connectivity to the SCs. We consider the association
problem of SCs and NFPs in a SC network and study the effect of practical
constraints related to the system and NFPs. Mainly, we show that the
association problem is related to the generalized assignment problem (GAP).
Using this relation with the GAP, we show the NPhard complexity of the
association problem and further derive an upper bound for the maximum
achievable sum data rate. Linear Programming relaxation of the problem is also
studied to compare the results with the derived bounds. Finally, two efficient
(less complex) greedy solutions of the association problem are presented, where
one of them is a distributed solution and the other one is its centralized
version. Numerical results show a favorable performance of the presented
algorithms with respect to the exhaustive search and derived bounds. The
computational complexity comparison of the algorithms with the exhaustive
search is also presented to show that the presented algorithms can be
practically implemented.

We propose a new onebit feedback scheme with scheduling decision based on
the maximum expected weighted rate. We show the concavity of the $2$user case
and provide the optimal solution which achieves the maximum weighted rate of
the users. For the general asymmetric Muser case, we provide a heuristic
method to achieve the maximum expected weighted rate. We show that the sum rate
of our proposed scheme is very close to the sum rate of the full channel state
information case, which is the upper bound performance.

5G+ systems expect enhancement in data rate and coverage area under limited
power constraint. Such requirements can be fulfilled by the densification of
small cells (SCs). However, a major challenge is the management of fronthaul
links connected with an ultra dense network of SCs. A cost effective and
scalable idea of using network flying platforms (NFPs) is employed here, where
the NFPs are used as fronthaul hubs that connect the SCs to the core network.
The association problem of NFPs and SCs is formulated considering a number of
practical constraints such as backhaul data rate limit, maximum supported links
and bandwidth by NFPs and quality of service requirement of the system. The
network centric case of the system is considered that aims to maximize the
number of associated SCs without any biasing, i.e., no preference for high
priority SCs. Then, two new efficient greedy algorithms are designed to solve
the presented association problem. Numerical results show a favorable
performance of our proposed methods in comparison to exhaustive search.

The densification of smallcell base stations in a 5G architecture is a
promising approach to enhance the coverage area and facilitate the ever
increasing capacity demand of end users. However, the bottleneck is an
intelligent management of a backhaul/fronthaul network for these smallcell
base stations. This involves efficient association and placement of the
backhaul hubs that connects these smallcells with the core network.
Terrestrial hubs suffer from an inefficient non line of sight link limitations
and unavailability of a proper infrastructure in an urban area. Seeing the
popularity of flying platforms, we employ here an idea of using networked
flying platform (NFP) such as unmanned aerial vehicles (UAVs), drones, unmanned
balloons flying at different altitudes, as aerial backhaul hubs. The
association problem of these NFPhubs and smallcell base stations is
formulated considering backhaul link and NFP related limitations such as
maximum number of supported links and bandwidth. Then, this paper presents an
efficient and distributed solution of the designed problem, which performs a
greedy search in order to maximize the sum rate of the overall network. A
favorable performance is observed via a numerical comparison of our proposed
method with optimal exhaustive search algorithm in terms of sum rate and
runtime speed.

In this paper, we characterize the asymmetric total degrees of freedom (DoF)
of a multipleinput multipleoutput (MIMO) 3way channel. Each node has a
separateantenna fullduplex MIMO transceiver with a different number of
antennas, where each antenna can be configured for either signal transmission
or reception. We study this system under two message configurations; the first
configuration is when each node has two unicast messages to be delivered to the
two other nodes, while the second configuration is when each node has two
unicast messages as well as one broadcast message to be delivered to the two
other nodes. For each configuration, we first derive upper bounds on the total
DoF of the system. Cutset bounds in conjunction with genieaided bounds are
derived to characterize the achievable total DoF. Afterwards, we analytically
derive the optimal number of transmit and receive antennas at each node to
maximize the total DoF of the system, subject to the total number of antennas
at each node. Finally, the achievable schemes for each configuration are
constructed. The proposed schemes are mainly based on zeroforcing and
nullspace transmit beamforming.

In this paper, we consider the twouser singleinput singleoutput (SISO)
Xchannel and $K$user SISO Xnetwork in fast fading environment. It is assumed
that the transmitters have access to synergistic alternating channel state
information (CSI). Specifically, the CSIT alternates between three states,
namely, perfect, delayed and noCSIT, in a certain manner to enable these
states to work together cooperatively. These states are associated with
fractions of time denoted by $\lambda_P$, $\lambda_D$ \text{and} $\lambda_N$,
respectively. For the twouser $X$channel, simple upper bound is developed to
prove the tightness of the achievability result of $4/3$ DoF under a certain
distribution of the availability of three CSIT states for
$\Lambda(\lambda_P=1/3, \lambda_D= 1/3, \lambda_N=1/3)$. For the $K$user
$X$network, it is shown that the sum Degrees of freedom (DoF) is at least
$2K/(K + 1)$, using twophase transmission schemes over finite symbols channel
extension and under the same distribution of the availability of
$\Lambda(\lambda_P=1/3, \lambda_D= 1/3, \lambda_N=1/3)$.This achievability
result, can be considered as a tight lower bound, coincides with the best lower
bound known for the same network but with partial output feedback in stead of
alternating CSIT. Hence, we show that the role of synergistic alternating CSIT
with distribution $\Lambda(1/3,1/3,1/3)$ is equivalent to the partial output
feedback. Also, this lower bound is strictly better than the best lower bound
known for the case of delayed CSI assumption for all values of $K$. All the
proposed transmission schemes are based on two phases transmission strategy,
namely, interference creation and interference resurrection, which exploit the
synergy of instantaneous CSI and delay CSIT to retrospectively align
interference in the subsequent channel uses.

We investigate the secure degrees of freedom (SDoF) of the Kuser MIMO
multiple access (MAC) and the two user MIMO interference channel. An unknown
number of eavesdroppers are trying to decode the messages sent by the
transmitters. Each eavesdropper is equipped with a number of antennas less than
or equal to a known value NE. The legitimate transmitters and receivers are
assumed to have global channel knowledge. We present the sum SDoF of the two
user MIMO interference channel. We derive an upperbound on the sum SDoF of the
Kuser MAC channel and present an achievable scheme that partially meets the
derived upperbound.

We investigate the secure degrees of freedom (SDoF) of the wiretap and the K
user Gaussian broadcast channels with multiple antennas at the transmitter, the
legitimate receivers and an unknown number of eavesdroppers each with a number
of antennas less than or equal to a known value NE. The channel matrices
between the legitimate transmitter and the receivers are available everywhere,
while the legitimate pair have no information about the eavesdroppers'
channels. We provide the exact sum SDoF for the considered system. A new
comprehensive upperbound is deduced and a new achievable scheme based on
utilizing jamming is exploited. We prove that cooperative jamming is SDoF
optimal even without the eavesdropper CSI available at the transmitters.

We investigate the secure degrees of freedom (SDoF) of a twotransmitter
Gaussian multiple access channel with multiple antennas at the transmitters,
the legitimate receiver with the existence of an unknown number of
eavesdroppers each with a number of antennas less than or equal to a known
value $N_E$. The channel matrices between the legitimate transmitters and the
receiver are available everywhere, while the legitimate pair does not know the
eavesdroppers' channels matrices. We provide the exact sum SDoF for the
considered system. A new comprehensive upperbound is deduced and a new
achievable scheme based on utilizing jamming is exploited. We prove that
Cooperative Jamming is SDoF optimal even without the instantaneous eavesdropper
CSI available at the transmitters.

In fullduplex systems, oscillator phase noise (PN) problem is considered the
bottleneck challenge that may face the selfinterference cancellation (SIC)
stage especially when orthogonal frequency division multiplexing (OFDM)
transmission scheme is deployed. Phase noise degrades the SIC performance
significantly, if not mitigated before or during the SIC technique. The
presence of the oscillator phase noise has different impacts on the transmitted
data symbol like common phase error (CPE) and intercarrier interference (ICI).
However, phase noise can be estimated and mitigated digitally in either time or
frequency domain. Through this work, we propose a novel and simple time domain
selfinterference (SI) phase noise estimation and mitigation technique. The
proposed algorithm is inspired from Wiener filtering in time domain. Simulation
results show that the proposed algorithm has a superior performance than the
alreadyexisting timedomain or frequency domain PN mitigation solutions with a
noticeable reduction in the computational complexity.

In this paper, we investigate the performance of multiuser diversity (MUD)
with optimal power allocation (OPA) in spectrum sharing (SS) under average
interference power (AIP) constraint. In particular, OPA through average
transmit power constraint in conjunction with the AIP constraint is assumed to
maximize the ergodic secondary capacity. The solution of this problem requires
the calculation of two Lagrange multipliers instead of one as obtained for the
peak interference power (PIP) constraint and calculated using the well known
waterfilling algorithm. To this end, an algorithm based on bisection method is
devised in order to calculate both Lagrange multipliers iteratively. Moreover,
Rayleigh and Nakagami$m$ fading channels with one and multiple primary users
are considered to derive the required endtoend SNR analysis. Numerical
results are depicted to corroborate our performance analysis and compare it
with the PIP case highlighting hence, the impact of the AIP constraint compared
to the PIP constraint application.

In this letter, we propose the interference cancellation through interference
alignment at the downlink of cognitive cellular networks. Interference
alignment helps the spatial resources to be shared among primary and secondary
cells and thus, it can provide higher degrees of freedom through interference
cancellation. We derive and depict the achievable degrees of freedom. We also
analyse and calculate the achievable sum rates applying waterfilling optimal
power allocation.

In the context of physical layer security, a physical layer characteristic is
used as a common source of randomness to generate the secret key. Therefore an
accurate estimation of this characteristic is the core for reliable secret key
generation. Estimation of almost all the existing physical layer characteristic
suffer dramatically at low signal to noise (SNR) levels. In this paper, we
propose a novel secret key generation algorithm that is based on the estimated
angle of arrival (AoA) between the two legitimate nodes. Our algorithm has an
outstanding performance at very low SNR levels. Our algorithm can exploit
either the Azimuth AoA to generate the secret key or both the Azimuth and
Elevation angles to generate the secret key. Exploiting a second common source
of randomness adds an extra degree of freedom to the performance of our
algorithm. We compare the performance of our algorithm to the algorithm that
uses the most commonly used characteristics of the physical layer which are
channel amplitude and phase. We show that our algorithm has a very low bit
mismatch rate (BMR) at very low SNR when both channel amplitude and phase based
algorithm fail to achieve an acceptable BMR.

We propose an intuitive, simple and hardware friendly, yet surprisingly novel
and efficient, received signal's angle of arrival (AoA) estimation scheme. Our
intuitive, twophases crosscorrelation based scheme relies on a switched beam
antenna array, which is used to collect an omnidirectional signal using few
elements of the antenna array in the first phase. In the second phase, the
scheme switches the main beam of the antenna array to scan the angular region
of interest. The collected signal from each beam (direction or angle) is cross
correlated with the omnidirectional signal. The crosscorrelation coefficient
will be the highest at the correct AoA and relatively negligible elsewhere. The
proposed scheme simplicity stems from its low computational complexity (only
crosscorrelation and comparison operations are required) and its independence
of the transmitted signal structure (does not require information about the
transmitted signal). The proposed scheme requires a receiver with switched beam
antenna array, which can be attached to a single radio frequency chain through
phase shifters, hence, its hardware friendliness. The high efficiency of our
system can be observed by comparing its performance with the literature's best
performing MUSIC algorithm. The comparison demonstrates that our scheme
outperforms the MUSIC algorithm, specially at low SNR levels. Moreover, the
number of sources that can be detected using our scheme is bound by the number
of switched beams, rather than the number of antenna elements in the case of
the MUSIC algorithm.

This paper investigates the maximum throughput for a rechargeable secondary
user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable
power supply. The SU maintains a finite energy queue and harvests energy from
natural resources, e.g., solar, wind and acoustic noise. We propose a
probabilistic access strategy by the SU based on the number of packets at its
energy queue. We investigate the effect of the energy arrival rate, the amount
of energy per energy packet, and the capacity of the energy queue on the SU
throughput under fading channels. Results reveal that the proposed access
strategy can enhance the performance of the SU.

In this paper, we establish the degrees of freedom (DoF) of the twouser
single input single output (SISO) Xchannel with alternating channel state
information at the transmitters (CSIT). Three cases are considered for the
availability of CSIT; perfect, delayed and noCSIT. Each state is associated
with a fraction of time denoted by $\lambda_P, \lambda_D$ and $\lambda_N $,
respectively. We provide new results for DoF of the twouser SISO Xchannel
when the available CSIT alternates between these three cases under a certain
distribution $\Lambda(\lambda_P, \lambda_D, \lambda_N )$. Specifically, we show
that the Xchannel with alternating CSIT for $\Lambda(1/8, 3/8, 1/2)$ can
achieve $5/4$ DoF. The interesting thing about $5/4$ is that it represents a
position of compromise or a middle ground between the channel knowledge that
transmitters need to steer interference and the degrees of freedom that the
network can achieve. Moreover, $5/4$ is strictly greater than $6/5$ which is
the upper bound for the Xchannel with \textit{fixed} delayed CSIT.

This paper investigates the maximum secondary throughput for a rechargeable
secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a
reliable power supply. The SU maintains a finite energy queue and harvests
energy from natural resources and primary radio frequency (RF) transmissions.
We propose a power allocation policy at the PU and analyze its effect on the
throughput of both the PU and SU. Furthermore, we study the impact of the
bursty arrivals at the PU on the energy harvested by the SU from RF
transmissions. Moreover, we investigate the impact of the rate of energy
harvesting from natural resources on the SU throughput. We assume fading
channels and compute exact closedform expressions for the energy harvested by
the SU under fading. Results reveal that the proposed power allocation policy
along with the implemented RF energy harvesting at the SU enhance the
throughput of both primary and secondary links.

In this paper, we consider a cognitive scenario where an energy harvesting
secondary user (SU) shares the spectrum with a primary user (PU). The secondary
source helps the primary source in delivering its undelivered packets during
periods of silence of the primary source. The primary source has a queue for
storing its data packets, whereas the secondary source has two data queues; a
queue for storing its own packets and the other for storing the fraction of the
undelivered primary packets accepted for relaying. The secondary source is
assumed to be a batterybased node which harvests energy packets from the
environment. In addition to its data queues, the SU has an energy queue to
store the harvested energy packets. The secondary energy packets are used for
primary packets decoding and data packets transmission. More specifically, if
the secondary energy queue is empty, the secondary source can neither help the
primary source nor transmit a packet from the data queues. The energy queue is
modeled as a discrete time queue with Markov arrival and service processes. Due
to the interaction of the queues, we provide inner and outer bounds on the
stability region of the proposed system. We investigate the impact of the
energy arrival rate on the stability region. Numerical results show the
significant gain of cooperation.

In this work, we study the problem of band allocation of $M_s$ buffered
secondary users (SUs) to $M_p$ primary bands licensed to (owned by) $M_p$
buffered primary users (PUs). The bands are assigned to SUs in an orthogonal
(onetoone) fashion such that neither band sharing nor multiband allocations
are permitted. In order to study the stability region of the secondary network,
the optimization problem used to obtain the stability region's envelope
(closure) is established and is shown to be a linear program which can be
solved efficiently and reliably. We compare our orthogonal allocation system
with two typical lowcomplexity and intuitive band allocation systems. In one
system, each cognitive user chooses a band randomly in each time slot with some
assignment probability designed such that the system maintained stable, while
in the other system fixed (deterministic) band assignment is adopted throughout
the lifetime of the network. We derive the stability regions of these two
systems. We prove mathematically, as well as through numerical results, the
advantages of our proposed orthogonal system over the other two systems.

In this paper, the 3user Gaussian MIMO interference channel is considered.
The asymmetric distribution of the DoF, where different users have different
number of DoF, is studied. Two cases are presented, the first is when all
transmitters and receivers have equal number of antennas $M$, the other when
the transmitters have $M$ antennas each, while the receivers have $N$ antennas
each. It is assumed that the channel coefficients are constant and known to all
transmitters and receivers. The region of the achievable DoF tuple $(d_1; d_2;
d_3)$ is presented.

This paper considers a network in which a primary user (PU) may cooperate
with a cognitive radio (CR) user for transmission of its data packets. The PU
is assumed to be a buffered terminal operating in a timeslotted fashion. We
develop two protocols which involve cooperation between primary and secondary
users. To satisfy certain quality of service requirements, users share time
slot duration and frequency bandwidth. Moreover, the secondary user (SU) may
leverage the primary feedback signal. The proposed protocols are designed such
that the secondary rate is maximized and the primary queueing delay is
maintained less than the queueing delay in case of noncooperative PU. In
addition, the proposed protocols guarantee the stability of the primary queue
and maintain the average energy emitted by the CR user below a certain value.
The proposed protocols also provide more robust and potentially continuous
service for SUs compared to the conventional practice in cognitive networks
where SUs transmit in the spectrum holes and silence sessions of the PUs. We
include primary source burstiness, sensing errors, and feedback reception
errors to the analysis of the proposed cooperative cognitive protocols.
Numerical results show the beneficial gains of the cooperative protocols in
terms of secondary rate and primary throughput, queueing delay, and average
energy savings.

In this paper, we propose a cognitive protocol that involves cooperation
between the primary and secondary users. In addition to its own queue, the
secondary user (SU) has a queue to store, and then relay, the undelivered
primary packets. When the primary queue is nonempty, the SU remains idle and
attempts to decode the primary packet. When the primary queue is empty, the SU
splits the total channel bandwidth into two orthogonal subbands and assigns
each to a queue probabilistically. We show the advantage of the proposed
protocol over the prioritized cognitive relaying (PCR) protocol in which the SU
assigns a priority in transmission to the primary packets over its own packets.
We present two problem formulations, one based on throughput and the other on
delay. Both optimization problems are shown to be linear programs for a given
bandwidth assignment. Numerical results demonstrate the benefits of the
proposed protocol.

In this paper, we consider a cognitive setting under the context of
cooperative communications, where the cognitive radio (CR) user is assumed to
be a selforganized relay for the network. The CR user and the PU are assumed
to be energy harvesters. The CR user cooperatively relays some of the
undelivered packets of the primary user (PU). Specifically, the CR user stores
a fraction of the undelivered primary packets in a relaying queue (buffer). It
manages the flow of the undelivered primary packets to its relaying queue using
the appropriate actions over time slots. Moreover, it has the decision of
choosing the used queue for channel accessing at idle time slots (slots where
the PU's queue is empty). It is assumed that one data packet transmission
dissipates one energy packet. The optimal policy changes according to the
primary and CR users arrival rates to the data and energy queues as well as the
channels connectivity. The CR user saves energy for the PU by taking the
responsibility of relaying the undelivered primary packets. It optimally
organizes its own energy packets to maximize its payoff as time progresses.

In this paper, we investigate the maximum throughput of a saturated
rechargeable secondary user (SU) sharing the spectrum with a primary user (PU).
The SU harvests energy packets (tokens) from the environment with a certain
harvesting rate. All transmitters are assumed to have data buffers to store the
incoming data packets. In addition to its own traffic buffer, the SU has a
buffer for storing the admitted primary packets for relaying; and a buffer for
storing the energy tokens harvested from the environment. We propose a new
cooperative cognitive relaying protocol that allows the SU to relay a fraction
of the undelivered primary packets. We consider an interference channel model
(or a multipacket reception (MPR) channel model), where concurrent
transmissions can survive from interference with certain probability
characterized by the complement of channel outages. The proposed protocol
exploits the primary queue burstiness and receivers' MPR capability. In
addition, it efficiently expends the secondary energy tokens under the
objective of secondary throughput maximization. Our numerical results show the
benefits of cooperation, receivers' MPR capability, and secondary energy queue
arrival rate on the system performance from a network layer standpoint.

In this paper, we propose a novel threetimeslot transmission scheme
combined with an efficient embedded linear channel equalization (ELCE)
technique for the Physical layer Network Coding (PNC). Our transmission scheme,
we achieve about 33% increase in the spectral efficiency over the conventional
twotimeslot scheme while maintaining the same endtoend BER performance.We
derive an exact expression for the endto end BER of the proposed
threetimeslot transmission scheme combined with the proposed ELCE technique
for BPSK transmission. Numerical results demonstrate that the exact expression
for the endtoend BER is consistent with the BER simulation results.