To view PDF files

You need Adobe Reader 7.0 or later in order to read PDF files on this site.
If Adobe Reader is not installed on your computer, click the button below and go to the download site.

Regular Papers

Interference Exploitation for Cognitive Radios

Hiroyuki Yomo, Kentaro Nishimori, Petar Popovski,
Yasushi Takatori, Ramjee Prasad, and Shuji Kubota

Abstract

Cognitive radios (CRs) operating in a frequency band owned by a legacy wireless communication system (often called the primary system) can be made more efficient if interference from the primary system is exploited instead of being regarded as a major disturbance that limits the opportunity to reuse the primary frequency band. However, since the primary system is a legacy system with known transmission parameters, the interference from the primary system should not always be treated as Gaussian-like noise. For a time-division-duplexing-based primary system, we show two examples of interference exploitation: (1) exploitation in the medium access control (MAC) layer to achieve distributed medium access for collocated CR networks (exploitation in the time domain) and (2) exploitation in the physical (PHY) layer where the interference from/to the primary system is cancelled/mitigated by using an adaptive array antenna (exploitation in the spatial domain). We show that such exploitation of interference can help cognitive radios efficiently reuse the primary spectrum in space and time.

PDF
NTT Network Innovation Laboratories,
Yokosuka-shi, 239-0847 Japan
Email: nishimori.kentaro@lab.ntt.co.jp

1. Introduction

Cognitive radio (CR)*1 has been proposed as a means to achieve efficient use of the radio spectrum [1], [2] and thus break the myth of spectrum scarcity. The basic concept is that a CR network is allowed to access the frequency spectrum assigned to a legacy system (called the primary system*2) as long as the interference conditions for the CR and the primary receivers are below an acceptable level. Such a secondary use of the spectrum is expected to provide wireless networks suffering from spectral congestion (e.g., wireless networks currently operating in the unlicensed spectrum such as wireless local area networks (WLANs)) with more opportunity to access the radio spectrum. If the primary system underutilizes the assigned spectrum segment, then the reuse of that segment can drastically improve the overall efficiency of spectrum utilization. In order for CR networks to satisfy the given interference condition, a CR transmitter should operate discreetly i.e., it should not cause harmful interference to the primary system. Furthermore, to satisfy the required quality of service (QoS) (such as throughput and delay), a CR network should operate efficiently even under interference from the primary system. So far, it has been considered that the key issue for achieving efficient operation is to avoid the interference from the primary system, which is regarded as a big disturbance for CR networks. However, considering that the primary system is a legacy system, which was deployed before the CR networks, it is reasonable to assume that the CR networks have certain knowledge about the transmission parameters of the legacy primary system. For example, the CR networks can know the traffic pattern, frame format, carrier configuration over frequency (i.e., the position of data and pilot carriers), modulation/coding parameters, etc. of the primary system. Furthermore, if the CR nodes are equipped with the full configuration of the radio interface of the primary system or with software defined radio (SDR) components [3], then they can also decode the primary signal. This is especially true when the interfering primary signal is sufficiently strong. In such a scenario, the interference from the primary system is not always Gaussian-like noise. Instead, it may carry decodable information that can be shared by the CR nodes and networks. This is particularly important when the primary system has a large service area that encompasses many CR networks. A key question here is what kind of information is available to the CR nodes and how such information can be exploited to enhance the overall performance of CR networks.

In this paper, we advocate a new approach to achieving efficient operation of CR networks by exploiting the interference from the primary system instead of regarding it solely as a disturbance. We show two examples of such interference exploitation: (1) exploitation in the medium access control (MAC) layer to achieve distributed medium access for collocated CR networks (exploitation in the time domain) and (2) exploitation in the physical (PHY) layer where the interference from/to the primary system is cancelled/mitigated by using an adaptive array antenna to achieve efficient and discreet operation of CR networks (exploitation in the spatial domain). We also discuss future research topics that will be opened up by our approach of regarding primary interference as useful information.

The rest of this paper is organized as follows. Section 2 presents our target scenario and model for coexistence between the primary*2 and secondary systems*3. Section 3 presents a medium access protocol that exploits the primary signal to coordinate the transmissions of distributed and independent CR networks. Section 4 presents a novel interference cancellation/mitigation technique that uses an adaptive array antenna, which exploits knowledge about the primary system as well as the signal of the primary system. Section 5 concludes with a summary of the main points and a discussion of future research issues.

*1 Cognitive radio: Cognitive radio has been developed for opportunistically exploiting frequency resources that are not being used in conventional systems. If there is a certain frequency band that is unutilized by a conventional system at a particular time and geographic location, that band can be temporarily exploited by a cognitive system. This kind of spectrum that is not utilized by its owner at a specific time and location is called a spectrum hole. Cognitive radios try to find spectrum holes automatically, and they utilize these frequencies while avoiding causing interference to other systems. Thus, cognitive systems could enable us to significantly enhance the frequency utilization in a given area.
*2 Primary system: Primary systems are defined as commercial systems. Generally, they do not know of the existence of secondary systems, and they can transmit signals freely.
*3 Secondary system: The terms cognitive radio and secondary system are used interchangeably.

2. Interference exploitation: target scenario

We consider CR networks that operate in a frequency band allocated to a primary system. We focus on the scenario where the CR networks coexist with the primary system, which means that the CR networks are within the interfering or communication range of the primary system. If the CR networks are not in such a coexisting condition, they do not suffer from primary interference and can operate as if the frequency band is allocated solely to the CRs. On the other hand, when the CR networks coexist with the primary system, they can find opportunities to successfully transmit and receive signals if the primary signal is inactive for some period or if the resulting interference is below an acceptable level.

Here, we explore such a reusable area inside the primary service area, which can significantly increase the spectrum available to CR networks. Such an increase is more significant when the primary system has a wide communication range while the CR networks have small, short-range communication areas [4]. Therefore, in this section, we focus on the coexistence of a long-range primary system and short-range CR networks. One example for a long-range primary system is a fixed wireless relay/access such as fixed Wi-MAX, while some examples of short-range networks are WLANs and sensor networks. In the above coexistence scenario, one important requirement for the CR transmitter is not to cause unacceptable interference to the primary receivers.

There are two different ways to handle such interference. One way is to regulate the transmission of each CR transmitter (e.g., possible transmission area and maximum transmission power) so that the primary receiver does not experience an unacceptable interference level. The other way is for the primary system to allow CR nodes to make transmissions in any area, but to require each CR transmitter to make the best effort to minimize the interference to primary receivers. We discuss the regulated case in Section 3 and the best-effort case in Section 4. We consider that the primary system is a legacy system that was deployed in a certain area before the CR networks. We assume that the CR networks have certain knowledge about the legacy primary system and we investigate how different amounts of knowledge and information can be exploited to achieve different benefits for CR networks.

3. Exploitation in time domain: distributed medium access

In this section, we consider interference exploitation for the MAC-layer operation of CR networks. In this case, there are many collocated CR networks within interfering range of each other, and they attempt to utilize a portion of the spectrum owned by the primary system. Such a scenario can occur if we consider a hotspot of WLANs that are based on cognitive radio technology. We assume that these networks are supposed to operate in a completely distributed and independent manner, meaning that they cannot communicate with each other to coordinate their transmissions. We consider that CR networks coexist with a primary system that has a periodic traffic pattern. Such periodic traffic could be generated by, for example, a beacon system that broadcasts information over its service area with a certain period of time. Another good example is the case when the primary system uses time division duplexing (TDD), which results in periodic interference to CR networks. This situation is depicted in Fig. 1. Here, the primary system has a point-to-point TDD link between nodes 1 and 2. In this case, the CR nodes located inside the communication range of primary node 1 experience strong interference when primary node 1 is transmitting. However, if these CR nodes are outside the range of primary node 2, they can experience weak interference when primary node 2 is transmitting, which can generate periodic opportunities for CR networks. Note that, in this section, we assume that the transmission power of CR nodes is regulated so that it does not cause harmful interference to the primary receiver. Thus, what a CR node has to do to achieve successful packet transmission is to find a period when it will not have simultaneous transmission with the primary system or other CR nodes.


Fig. 1. Scenario for periodic opportunities for CR networks coexisting with a TDD-based primary system.

The difficulty in achieving an efficient medium access in the above distributed condition comes from the fact that there is no central entity to coordinate the transmissions and that the independent networks cannot communicate with each other to share common information. However, since we treat a legacy primary system whose signal is transmitted widely, each CR network can obtain the following common information from the primary signal.

(1) Common frame

Each CR node uses the primary signals as a common clock. Thus, each node detects the primary signals and sets the start of a primary signal to the beginning of a frame, which is shared by all the CR nodes. Thanks to this operation, CR nodes can have a global clock, i.e., a framed channel in a distributed manner.

(2) Common random number

We assume that CR nodes can decode the primary signal and that they decode each periodic primary signal. We define N bits of information in a certain field of the primary packet (e.g., the first N bits of a packet) as a bit sequence that is observed by all the CR nodes. We define in advance the mapping between each possible bit sequence and an integer between 1 and M. We call the resulting random integer the common number (CN). The mapping is made so that CN takes an integer value between 1 and M as uniformly as possible. This number can change every frame because the information included in the primary signal can be differ frame by frame, but all CR nodes can share this number for each frame, which can basically create a common numbering scheme for each frame.

Thus, CR nodes exploit the primary signal as a beacon to create a logical time frame to be used by independent CR networks. Here, we propose a medium access protocol called interference-aided medium access (IAMA) that can achieve distributed time division multiple access (TDMA) with the above information obtained from the primary signal. Note that such a TDMA operation can also be achieved with reservation-based random access such as packet reservation multiple access (PRMA) and reservation ALOHA [5]; however, these protocols require a central coordinator or pre-configured frame structure. Below, we briefly describe the basic operation of IAMA. For details of the procedure, readers are referred to [6].


Fig. 2. Frame structure created by exploiting interference from the primary system.

  • At the beginning of a frame (i.e., after each periodic signal of the primary system), we define M mini-slots, each of which has a fixed length. The length of a mini-slot is designed so that if a CR node transmits a signal in a mini-slot, the other CR nodes within its interfering range can sense it reliably. The mini-slots in each frame are numbered by using CN shared by all the CR nodes. Thus, if CN = m, then the slots are numbered m, m ⊕ 1 … m ⊕ (M - 1), where ⊕ is addition modulo M. An example with M = 4 is shown in Fig. 2. Here, CN = 3 is observed from the primary signal in the first frame, i.e., CN = 1 for the second frame.
  • Each CR node keeps a vector called the Access Set, which consists of one or more integers within 1 … M. In each frame, if a CR node has packets to send, it checks to see if it has the number of each mini-slot within its Access Set. If the node finds the number, it sends packets in the mini-slot. Otherwise, it senses the medium during that mini-slot, and if it detects a signal, it defers its access until the next frame.
  • If the packet transmission is successful (this can be detected by the reception of the ACK signal), the CR node continues to transmit its packets during this frame without further contention (thus this frame is reserved for this node). On the other hand, if the CR node does not receive an ACK signal, it can be considered that the packet collided with other nodes also having the number of the mini-slot within their Access Sets. In this case, the CR nodes operate with carrier sense multiple access with collision avoidance (CSMA/CA, e.g., as in IEEE 802.11) to avoid further collisions during this frame.
  • After a frame in which collisions occurred, each involved transmitting CR node modifies its Access Set in a random manner. For example, if each CR node is supposed to include only one integer in its Access Set, it chooses one randomly out of M integers and includes it in a new Access Set. This can help CR nodes to choose different numbers in their Access Sets and thus separate the access by different CR nodes.
  • If a CR node experiences collisions with a certain number of continuous frames, the CR node reduces the frequency of access to the medium. This is achieved by letting the CR node access the medium every K frames in a deterministic manner. This method, which is referred to as punctured access, can handle the situation where the number of contending CR nodes per frame is larger than the number of mini-slots.

The above operation achieves prioritized transmission in each frame. Thus, the ordering of the mini-slots determines the priority to be applied in each frame. For example, in the first frame in Fig. 2, the CR nodes with Access Sets that include 3 have the highest priority for transmitting packets. The CR nodes can transmit a packet in each frame if there are no contending CR nodes with higher priority. The advantage of this medium access is that, once CR nodes find the Access Set that enables successful packet transmission, they can achieve collision-free transmissions unless new CR nodes (networks) arrive in the contending area.

Simulation results for the throughput of our scheme IAMA and the basic CSMA/CA scheme are shown in Fig. 3. Note that CSMA/CA is a representative medium access protocol that operates in a distributed manner, that is, without any central coordinator or information exchange among contending nodes. Since no other specific MAC schemes for CR systems have been proposed yet, we compared IAMA with the basic CSMA/CA scheme. Here, with the CSMA/CA mode, the CR nodes contend for the medium only while the primary signal is absent. The throughput is defined as the fraction of time used by the successful (data) packet transmissions. We assume that the CR nodes are fully loaded, so each node always has packets to transmit. Other details of the simulation scenario and parameters can be found in [6]. From the figure, we can see that the throughput performance of the CSMA/CA scheme is much lower than that of IAMA. This is because CSMA/CA necessarily involves contention to the medium for each packet transmission and enters a back-off process to resolve the contention. On the other hand, IAMA can achieve collision-free transmission most of the time and can achieve high throughput performance irrespective of the number of contending CR nodes. This is similar to the effect of PRMA or reservation ALOHA under highly congested conditions, though IAMA achieves such a behavior not by explicit central coordination or by using a pre-configured frame but by coordination achieved by utilizing the primary signal.


Fig. 3. Throughput performance of IAMA and basic CSMA/CA mode.

There can be further application of the above common information among different CR networks. For example, in [7], the performance of Bluetooth networks, which utilize frequency hopping, is analyzed when multiple small networks (termed piconets) coexist and interfere with each other. This section shows that inter-piconet interference can severely degrade the throughput performance; however, if multiple piconets are somehow synchronized, the degradation can be smaller. The authors of [7] did not provide a way to synchronize those multiple piconets because it is generally difficult to synchronize such networks due to the lack of a synchronization mechanism, geographical location (different networks can interfere with each other, but are not necessarily within communication range of each other), etc. However, if such different frequency-hopping-based networks coexist in the frequency band assigned to the primary system with periodic traffic, they can be synchronized to each other by using the interference, as described in this section, and the throughput degradation can be greatly alleviated. Such “global timing synchronization” is a valuable assumption in many distributed algorithms for medium access [8], which can be obtained with our interference exploitation approach.

4. Exploitation in spatial domain: interference cancellation/mitigation with adaptive array antenna

In this section, we introduce a PHY-layer approach for exploiting interference. We introduce a new technique in which CR nodes exploit knowledge about the primary system and the signal of the primary system to cancel/mitigate the interference from/to the primary system in the spatial domain by using an adaptive array antenna. This scheme can achieve efficient operation of the CR receiver, thus canceling the interference from the primary system, as well as discreet operation, thus mitigating the interference from the CR transmitter to the primary receiver. This allows CR nodes to reuse the primary frequency band even if they are located close to the primary node. This exploitation technique can be applied to a primary system that utilizes TDD or frequency division duplexing (FDD). More precisely, the key point of our scheme is for CR nodes to observe a pair of TDD periods, (t1, t2), which are the transmitting or receiving timings for a primary node, or a pair of FDD frequency bands, (f1, f2), which are the transmitting or receiving bands for a primary node. We assume that the CR nodes have knowledge about these transmission parameters of the primary system and that they know the exact timing for the pair of periods to appear (TDD case) or the exact frequency bands (FDD case). In this section, we give details of our scheme for only the TDD case. The operation of the interference cancellation/mitigation scheme is shown in Fig. 4. We assume that there are two primary nodes operating in TDD mode with a repeated pair of periods (t1, t2). Primary node 1 (node 2) transmits (receives) the signal during period t1 while primary node 2 (node 1) transmits (receives) the signal during period t2. The first step of the scheme is for CR nodes to detect and measure the power levels P(t1) and P(t2) in t1 and t2 (step (a) in Fig. 4). Then, the power levels P(t1) and P(t2) are compared; according to the results of the comparison, CR nodes make the following decisions:


Fig. 4. Interference cancellation/mitigation scheme with adaptive array antenna.

  • If P(t1) is greater than P(t2), then the signal during t1 is chosen as the target signal to be cancelled with the interference cancellation technique.
  • If P(t2) is greater than P(t1), then the signal during t2 is chosen as the target signal to be cancelled.

Figure 4 shows an example where a CR network is closer to primary node 2, and it observes a higher interference level during period t2. While the interference cancellation technique is required to achieve successful transmission during t2 due to the high interference level, CR nodes have the potential to achieve successful transmission even without the cancellation technique during t1 thanks to the lower interference level. However, the large power level in t2 and small power level in t1 mean that primary node 2 is likely to be in the vicinity of the CR nodes. This can be judged because the received signal power basically depends on the propagation path loss, which is dominated by the distance between the transmitting and receiving entities. In such a case, the transmission of CR nodes during t1 can cause interference to primary node 2. Since the primary systems are not necessarily designed to avoid such interference, CR nodes should make the best effort to minimize such interference in order to achieve discreet operation.

To enable CR nodes to overcome such interference from/to the primary system, our scheme operates as follows. First, the CR nodes cancel the interfering signals by making a null pattern in the direction of the signals with the higher power level (i.e., the signal arriving during t2), as shown in Fig. 4(b). Here, as an example, we use an adaptive array antenna at the access point (AP) of the CR network. As an adaptive algorithm for interference cancellation, the minimum power method or eigenvalue decomposition can be utilized [9]. With this operation, we can let a mobile station (MS) transmit signals during t2, and the AP can receive the signal while reducing the amount of interference. Note that such a transmission by an MS is unlikely to interfere with the reception at primary node 1 because the distance between them is large. Next, during period t1, the AP transmits signals to the MS by using the weights that were calculated to create a null pattern during t2, as shown in Fig. 4(c). Since the same frequency band is used for transmission and reception in TDD mode, the weights calculated during t2 to create a receiving null pattern can be reused to create a transmitting null pattern that is appropriately directed toward the primary receiver. Such a transmission by the AP can mitigate the interference to primary node 2. Thus, the interference observed during t2 is exploited to identify the direction of the primary receiver, which could suffer interference from the transmission of CR nodes. By using this scheme, we can achieve close coexistence between the CR nodes and the primary system because the CR nodes can cancel/mitigate the interference from/to the primary system. Knowledge about the primary system and the signals of the primary system are exploited to enable CR nodes to find appropriate timings and null patterns for their transmission and reception. This can open up more opportunities for the CR nodes to reuse the primary frequency band.

The cumulative distribution function (CDF) of the carrier-to-interference-plus-noise ratio (CINR) with and without our scheme is shown in Fig. 5. The simulation parameters are shown in Table 1. The propagation path loss used here, which was taken from [10], enables us to evaluate the performance for various antenna heights. In other words, heterogeneous path loss conditions can be taken into account for different links such as the transmission between the primary transmitter and receiver and the interference from the primary system to the CR nodes, as well as the interference from the CR nodes to the primary receiver. We considered two entities in the primary system—a base station (BS) and a subscriber station (SS)—and set the heights of their antennas to 30 and 2 m, respectively. In order to examine the characteristics of our scheme under less favorable conditions for CRs, we assumed the antenna height of a CR node to be 20 m, where the path loss from BS to CR nodes is much smaller than the path loss between BS and SS. The number of antennas at the AP was set to 2, and the location of CR nodes was randomly changed inside the service area of the primary system.


Fig. 5. CINR with and without our interference cancellation/mitigation technique.


Table 1. Simulation parameters.

From Fig. 5, we can see that the CINR without our interference cancellation/mitigation scheme was strongly degraded (thus there was a high probability of having a lower CINR) due to the strong interference from the primary system. On the other hand, with interference cancellation/mitigation, the CINR value was significantly improved, and the performance at the AP was close to the case without the primary interference. Moreover, the CINR of the MS in the CR network was much higher than the condition with the greatest interference even without the interference cancellation at the receiver because the transmission was performed during the period with less interference (i.e., t1 in the example in Fig. 4). We have also confirmed that the degradation of CINR at the primary receiver is very small thanks to the transmission by the AP with the appropriate null pattern toward the primary receiver.

5. Concluding remarks

In this paper, we advocated exploiting interference from the primary system to enhance the communication performance of CR networks. Instead of regarding the interference from the primary system as just a disturbance, we can use the knowledge about transmission parameters and also use the actual interference signal of the primary system to increase the opportunities for CR networks to reuse the primary frequency band. For a TDD-based primary system, we showed examples of such exploitation, namely exploitation in the MAC layer to achieve distributed medium access among cognitive radios (exploitation in the time domain) and exploitation in the PHY layer to achieve interference cancellation/mitigation from/to the primary systems with the use of an adaptive array antenna (exploitation in the spatial domain). Although we discussed such exploitation mechanisms for a TDD-based primary system with periodic transmission/reception patterns, such periodicity is not a necessary condition for these mechanisms. Instead, these mechanisms can be applied as long as CR nodes can identify the transmission/reception timing of primary systems, which could be obtained by, for example, decoding the control information transmitted by the primary nodes.

Our approach of exploiting the primary interference could open up several future research topics. First, the interference from the primary system is far less random than Gaussian noise, and even more important, a CR can decode the signals from the primary system. Thus, the receiver of the cognitive radio observes a multiple access channel of two users, one being the desired transmitter and the other being the undesired primary transmitter. In principle, the receiver can try to decode both signals jointly e.g., through successive interference cancellation. Such an operating mode will give the CR more spatial capacity because it will be able to operate in regions of high interference by decoding and subtracting that interference. Clearly, it is desirable to not only quantify the gain provided by such an operating mode, but also devise practical methods of implementing such interference decoding/subtraction. Second, combined exploitation strategies for PHY/MAC layers should be investigated, e.g., the two mechanisms described in this paper should be integrated so that CR nodes can efficiently share the spatial/temporal opportunities created by the interference cancellation/mitigation technique. Finally, further investigation of possible transmission parameters that CR nodes can exploit is required. In this paper, the key information and parameters for the interference exploitation were the duplexing mode (TDD) of the primary system. However, CR nodes could also know other parameters of the primary system, such as modulation/coding and frequency-carrier configuration. Exploitation of such information could further enhance the efficiency of CR nodes in reusing the primary spectrum, which could result in higher utilization efficiency of our precious frequency resources.

Acknowledgment

This work is in part supported by the Danish Research Council for Technology and Production Sciences (Project No. 274-05-0490).

References

[1] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications, Vol. 23, No. 2, pp. 201–202, Feb. 2005.
[2] I. F. Akyildiz, W. Y. Lee, M. C. Vuran, and S. Mohanty, “Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey,” Elsevier Computer Networks, Vol. 50, No. 13, pp. 2127–2159, Sept. 2006.
[3] J. Mitola III and W. Tuttlebee, “Software Defined Radio: Origins, Drivers and International Perspectives,” Chichester, UK: John Wiley & Sons, 2002.
[4] K. Nishimori, E. Bottega, H. Yomo, P. Popovski, Y. Takatori, R. Prasad, and S. Kubota, “Spatial availability for cognitive radio system under directional interference,” Proc. of 9th International Symposium on Wireless Personal Multimedia Communications (WPMC06), San Diego, USA, Sept. 2006.
[5] J. Schiller, “Mobile Communications,” second ed. Addison Wesley, 2003.
[6] H. Yomo and P. Popovski, “Interference-aided medium access for cognitive radio networks,” Proc. of 9th International Symposium on Wireless Personal Multimedia Communications (WPMC06), San Diego, USA, Sept. 2006.
[7] I. Ashraf, A. Gkelias, L. Musavian, M. Dohler, and A. Aghvami, “Performance evaluation in time-synchronized multipiconet Bluetooth environments,” Proc. of International Workshop on Wireless Ad-hoc Networks (IWWAN05), London, UK, May 2005.
[8] R. Rozovsky and P. R. Kumar, “Seedex: A MAC protocol for ad hoc networks,” Proc. of The ACM Symposium on Mobile Ad Hoc Networking and Computing, (MobiHoc 2001), Long Beach, USA, pp. 67–75, Oct. 2001.
[9] B. Allen and M. Ghavami, “Adaptive Array Systems: Fundamentals and Applications,” Chichester, UK: John Wiley & Sons, 2005.
[10] S. Ichitsubo, T. Furuno, T. Nagato, T. Taga, and R. Kawasaki, “2GHz-Band Propagation Loss Prediction in Urban Areas; antenna heights ranging from ground to building roof,” IEICE Technical Report, Vol. 96, No. 35 (19960516), pp. 1–6, 1996 (in Japanese).
Hiroyuki Yomo
Assistant Research Professor, Aalborg University, Denmark.
He received the B.S. degree in communication engineering from the Department of Communication Engineering, Osaka University, Osaka, in 1997, and the M.S. and Ph.D. degrees in communication engineering from the Department of Electronic, Information, and Energy Engineering, Graduate School of Engineering, Osaka University, Osaka, in 1999 and 2002, respectively. From April 2002 to March 2004, he was a post-doctoral Fellow in the Department of Communication Technology, Aalborg University, Denmark. From April 2004 to September 2004, he was at the Internet System Laboratory, NEC Corporation. In October 2004, he joined the Center for TeleInFrastruktur, Aalborg University, Denmark, as an Assistant Research Professor. He has been an Associate Professor there since February 2006. His main research interests are access technologies, radio resource management, and link-layer techniques in the area of short-range communication, cellular networks, cognitive radio, relay networks, and wireless network coding.
Kentaro Nishimori
Research Engineer, Wireless Systems Innovation Laboratory, NTT Network Innovation Laboratories.
He received the B.E., M.E., and Dr.Eng. degrees in electrical and computer engineering from Nagoya Institute of Technology, Aichi, in 1994, 1996, and 2002, respectively. He joined NTT Wireless Systems Laboratories in 1996. He was a visiting researcher at the Center for TeleInFrastruktur, Aalborg University, Denmark in 2006. He received the Young Engineers Award from the Institute of Electronics, Information and Communication Engineers (IEICE) of Japan in 2001 and Young Engineer Award from IEEE AP-S Japan Chapter in 2001. His current research interests are multi-user MIMO systems and cognitive radio systems. He is a member of IEEE and IEICE.
Petar Popovski
Assistant Professor, Department of Electronic Systems, Aalborg University, Denmark.
He received the Dipl.-Ing. in electrical engineering and the M.Sc. degree in communication engineering from the Faculty of Electrical Engineering, Sts. Cyril and Methodius University, Skopje, Macedonia, in 1997 and 2000, respectively, and the Ph.D. degree from Aalborg University, Denmark, in 2004. His research interests are focused on cooperative wireless networks, cross-layer design of wireless protocols (MAC/PHY), cognitive radio, wireless networks with unlicensed operation, network coding, random access protocols, and information theory.
Yasushi Takatori
Assistant Professor, Department of Electronic Systems, Aalborg University, Denmark.
He received the Dipl.-Ing. in electrical engineering and the M.Sc. degree in communication engineering from the Faculty of Electrical Engineering, Sts. Cyril and Methodius University, Skopje, Macedonia, in 1997 and 2000, respectively, and the Ph.D. degree from Aalborg University, Denmark, in 2004. His research interests are focused on cooperative wireless networks, cross-layer design of wireless protocols (MAC/PHY), cognitive radio, wireless networks with unlicensed operation, network coding, random access protocols, and information theory.
Ramjee Prasad
Wireless Information Multimedia Communications chair and co-director of Center for PersonKommunikation, Aalborg University, Denmark.
He is a distinguished educator and researcher in the field of wireless information and multimedia communications. During February 1988 to May 1999, he was with the Telecommunications and Traffic-Control Systems Group at Delft University of Technology, the Netherlands, where he was actively involved in the area of wireless personal and multimedia communications. He was head of the Transmission Research Section of the International Research Centre for Telecommunications Transmission and Radar and also Founding Program Director of the International Research Centre for Telecommunications Transmission. In June 1999, he joined Aalborg University as the Wireless Information Multimedia Communications chair and co-director of the Center for PersonKommunikation. Since January 2004, he has been Founding Director of the Center for TeleInFrastruktur. He has published over 500 technical papers and authored or edited 15 books about wireless multimedia communications (Artech House). His research interests lie in wireless networks, packet communications, multiple access protocols, adaptive equalizers, spread-spectrum CDMA systems, and multimedia communications. He is the founding chairperson of the European Centre of Excellence in Telecommunications known as the HERMES Partnership. He was the General Chairman of the International Wireless Summit (IWS 2005) held in Aalborg in 2005. He is a fellow of the Institute of Electrical Engineering, a fellow of the Institute of Electronics and Telecommunication Engineers, a senior member of IEEE, a member of the North East Radio Group, and a member of the Danish Engineering Society (IDA). He is an advisor to several multinational companies.
Shuji Kubota
Director, Vice President, Wireless Systems Innovation Laboratory, NTT Network Innovation Laboratories.
He received the B.E. degree from the University of Electro-Communications, Tokyo, in 1980 and the Ph.D. degree in engineering from Osaka University, Osaka, in 1995. Since joining Nippon Telegraph and Telephone Public Corporation (now NTT) in 1980, he has been engaged in R&D of forward error correction schemes and modulation-demodulation schemes for satellite and personal communication systems (PHS), software-defined radio systems, wireless LAN systems, wireless access systems, millimeter wave systems, advanced MIMO technologies, and wide-area sensor network systems. During 1991–1992, he was a visiting researcher at the University of California, Davis. He is a member of IEEE and IEICE.

↑ TOP