Skip to main content

Showing 1–11 of 11 results for author: Brante, G

.
  1. Reinforcenment Learning-Aided NOMA Random Access: An AoI-Based Timeliness Perspective

    Authors: Felippe Moraes Pereira, Jamil de Araujo Farhat, João Luiz Rebelatto, Glauber Brante, Richard Demo Souza

    Abstract: In this paper, we investigate the age-of-information (AoI) of a power domain non-orthogonal multiple access (NOMA) network, where multiple internet-of-things (IoT) devices transmit to a common gateway in a grant-free random fashion. More specifically, we consider a framed setup composed of multiple time slots, and resort to the $Q$-learning algorithm to properly define, in a distributed manner, th… ▽ More

    Submitted 7 October, 2024; v1 submitted 4 October, 2024; originally announced October 2024.

  2. Performance Analysis of 6TiSCH Networks Using Discrete Events Simulator

    Authors: Guilherme de Santi Peron, Marcos Eduardo Pivaro Monteiro, João Luís Verdegay de Barros, Jamil Farhat, Glauber Brante

    Abstract: The Internet of Things (IoT) empowers small devices to sense, react, and communicate, with applications ranging from smart ordinary household objects to complex industrial processes. To provide access to an increasing number of IoT devices, particularly in long-distance communication scenarios, a robust low-power wide area network (LPWAN) protocol becomes essential. A widely adopted protocol for t… ▽ More

    Submitted 7 October, 2024; v1 submitted 4 October, 2024; originally announced October 2024.

  3. arXiv:2406.16624  [pdf, other

    eess.SP

    Decentralized RL-Based Data Transmission Scheme for Energy Efficient Harvesting

    Authors: Rafaela Scaciota, Glauber Brante, Richard Souza, Onel Lopez, Septimia Sarbu, Mehdi Bennis, Sumudu Samarakoon

    Abstract: The evolving landscape of the Internet of Things (IoT) has given rise to a pressing need for an efficient communication scheme. As the IoT user ecosystem continues to expand, traditional communication protocols grapple with substantial challenges in meeting its burgeoning demands, including energy consumption, scalability, data management, and interference. In response to this, the integration of… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: Accepted in EuCNC 2024 conference

  4. arXiv:2205.00406  [pdf, ps, other

    cs.IT cs.NI math.ST

    Coordinated Pilot Transmissions for Detecting the Signal Sparsity Level in a Massive IoT Network under Rayleigh Fading

    Authors: Onel L. A. López, Glauber Brante, Richard D. Souza, Markku Juntti, Matti Latva-aho

    Abstract: Grant-free protocols exploiting compressed sensing (CS) multi-user detection (MUD) are appealing for solving the random access problem in massive machine-type communications (mMTC) with sporadic device activity. Such protocols would greatly benefit from a prior deterministic knowledge of the sparsity level, i.e., instantaneous number of simultaneously active devices $K$. Aiming at this, herein we… ▽ More

    Submitted 1 May, 2022; originally announced May 2022.

    Comments: 31 pages, 8 figures, 2 tables. Submitted to IEEE TWC

  5. arXiv:2107.09169  [pdf, ps, other

    cs.IT eess.SP eess.SY

    Exploring the Non-Overlapping Visibility Regions in XL-MIMO Random Access Protocol

    Authors: José Carlos Marinello Filho, Glauber Brante, Richard Demo Souza, Taufik Abrão

    Abstract: The recent extra-large scale massive multiple-input multiple-output (XL-MIMO) systems are seen as a promising technology for providing very high data rates in increased user-density scenarios. Spatial non-stationarities and visibility regions (VRs) appear across the XL-MIMO array since its large dimension is of the same order as the distances to the user-equipments (UEs). Due to the increased dens… ▽ More

    Submitted 19 July, 2021; originally announced July 2021.

    Comments: 10pages, 6 figures, 2 tables. Index terms: Random-access protocol, grant-based protocols, massive MIMO, XL-MIMO, non-stationarity, visibility region (VR), scheduling

  6. arXiv:2107.07193  [pdf, ps, other

    eess.SP

    Two-Stage Channel Estimation for Hybrid RIS Assisted MIMO Systems

    Authors: Rafaela Schroeder, Jiguang He, Glauber Brante, Markku Juntti

    Abstract: Reconfigurable intelligent surfaces (RISs) have been proposed as a key enabler to improve the coverage of the signals and mitigate the frequent blockages in millimeter wave (mmWave) multiple-input multiple-output (MIMO) communications. However, the channel state information (CSI) acquisition is one of the major challenges for the practical deployment of the RIS. The passive RIS without any baseban… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

    Comments: 30 pages, 11 figures

  7. Network-Coded Cooperative LoRa Network with D2D Communication

    Authors: L. H. O. Alves, J. L. Rebelatto, R. D. Souza, G. Brante

    Abstract: We evaluate the outage probability and the energy efficiency (EE) of a LoRa network when the end-devices (EDs) are capable of exchanging messages with a device-to-device (D2D) technology. Our proposal is to assess the performance of the network when operating under the concept of network-coded cooperation (NCC), where the EDs are capable of transmitting linear combinations of more than one frame (… ▽ More

    Submitted 7 December, 2021; v1 submitted 6 July, 2021; originally announced July 2021.

    Comments: 11 pages, 7 figures, published on the IEEE Internet of Things Journal

  8. arXiv:1709.01019  [pdf, ps, other

    cs.IT

    Maximum Secrecy Throughput of MIMOME FSO Communications with Outage Constraints

    Authors: Marcos Eduardo Pivaro Monteiro, João Luiz Rebelatto, Glauber Brante, Richard Demo Souza

    Abstract: In this work, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of Free-Space Optical (FSO) communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors. Two different schemes are considered depending on the availability of channel state information (CSI) at Alice: i) the adaptive scheme, where A… ▽ More

    Submitted 7 March, 2018; v1 submitted 4 September, 2017; originally announced September 2017.

    Comments: to appear in IEEE Transactions on Wireless Communications

  9. On the Secure Energy Efficiency of TAS/MRC with Relaying and Jamming Strategies (Extended Version)

    Authors: Jamil Farhat, Glauber Brante, Richard Demo Souza

    Abstract: In this paper we investigate the secure energy efficiency (SEE) in a cooperative scenario where all nodes are equipped with multiple antennas. Moreover, we employ secrecy rate and power allocation at Alice and at the relay in order to maximize the SEE, subjected to a constraint in terms of a minimal required secrecy outage probability. Only the channel state information (CSI) with respect to the l… ▽ More

    Submitted 12 June, 2017; originally announced June 2017.

    Comments: 10 pages, 5 figures

  10. arXiv:1701.00767  [pdf, ps, other

    cs.IT

    Employing Antenna Selection to Improve Energy-Efficiency in Massive MIMO Systems

    Authors: Masoud Arash, Ehsan Yazdian, Mohammad sadegh Fazel, Glauber Brante, Muhammad Imran

    Abstract: Massive MIMO systems promise high data rates by employing large number of antennas, which also increases the power usage of the system as a consequence. This creates an optimization problem which specifies how many antennas the system should employ in order to operate with maximal energy efficiency. Our main goal is to consider a base station with a fixed number of antennas, such that the system c… ▽ More

    Submitted 14 June, 2017; v1 submitted 3 January, 2017; originally announced January 2017.

    Comments: To appear in Transactions on Emerging Telecommunications Technologies, 12 pages, 8 figures, 2 tables

  11. On the Performance of Secure Full-Duplex Relaying under Composite Fading Channels

    Authors: Hirley Alves, Glauber Brante, Richard D. Souza, Daniel B. da Costa, Matti Latva-aho

    Abstract: We assume a full-duplex (FD) cooperative network subject to hostile attacks and undergoing composite fading channels. We focus on two scenarios: \textit{a)} the transmitter has full CSI, for which we derive closed-form expressions for the \textit{average secrecy rate}; and \textit{b)} the transmitter only knows the CSI of the legitimate nodes, for which we obtain closed-form expressions for the \t… ▽ More

    Submitted 21 November, 2014; v1 submitted 14 November, 2014; originally announced November 2014.