Change search
Link to record
Permanent link

Direct link
BETA
Duong, Trung Quang
Alternative names
Publications (10 of 62) Show all publications
Nasir, A. A., Tuan, H. & Duong, T. Q. (2018). Fractional Time Exploitation for Serving IoT Users with Guaranteed QoS by 5G Spectrum. IEEE Communications Magazine, 56(10), 128-133, Article ID 8493131.
Open this publication in new window or tab >>Fractional Time Exploitation for Serving IoT Users with Guaranteed QoS by 5G Spectrum
2018 (English)In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 56, no 10, p. 128-133, article id 8493131Article in journal (Refereed) Published
Abstract [en]

It is generally understood that forthcoming 5G communication technologies such as full duplex (FD), massive multiple-input multiple-output (MIMO), non-orthogonal multiple access (NOMA), and simultaneous wireless information and power transfer (SWIPT) aim at the maximal use of communication spectrum to provide a new experience of service for users. FD provides simultaneous signal transmission and reception over the same frequency band. Massive MIMO uses massive numbers of antennas to provide high throughput connectivity for users. NOMA improves network throughput by allowing some users to access information intended for other users. SWIPT provides simultaneous information and power transfer. However, it is still very challenging to utilize these spectrum exploitation technologies to secure the needed quality of service for users in the age of the Internet of Things. In FD, the signal transmission interference to signal reception, even after analog and digital self-interference cancellation, is considerable, which downgrades both transmission and reception throughput. To maintain the favored channel characteristics, massive MIMO means to serve a few users per time unit only. In NOMA, the users' throughput is improved by compromising communication privacy. Information and power transmissions head to conflicting targets that are difficult to achieve simultaneously with SWIPT. This article introduces a new technique, called the fractional-time approach, which ensures guaranteed and better transmission and reception throughput without the need for complex FD, enables serving a massive number of users in a massive MIMO system, provides guaranteed users' throughput without security compromise as in NOMA, and delivers high volumes of both information and power transfer within a time unit. © 1979-2012 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2018
Keywords
Energy transfer, Finite difference method, Internet of things, MIMO systems, Quality of service, Throughput, Channel characteristics, Communication privacy, Communication technologies, Information and power transfers, Massive MIMO systems, Non orthogonal multiple accesses (NOMA), Simultaneous signals, Simultaneous wireless information and power transfer (SWIPT), 5G mobile communication systems
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-17269 (URN)10.1109/MCOM.2018.1800021 (DOI)2-s2.0-85055338911 (Scopus ID)
Available from: 2018-11-15 Created: 2018-11-15 Last updated: 2018-11-16Bibliographically approved
Phan, H., Zepernick, H.-J., Duong, Q. T., Tran, H. & Chu, T. M. (2015). Cognitive amplify-and-forward relay networks with beamforming under primary user power constraint over Nakagami-m fading channels. Wireless Communications & Mobile Computing, 15(1), 56-70
Open this publication in new window or tab >>Cognitive amplify-and-forward relay networks with beamforming under primary user power constraint over Nakagami-m fading channels
Show others...
2015 (English)In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 15, no 1, p. 56-70Article in journal (Refereed) Published
Abstract [en]

In this paper, we analyze the performance of cognitive amplify-and-forward (AF) relay networks with beamforming under the peak interference power constraint of the primary user (PU). We focus on the scenario that beamforming is applied at the multi-antenna secondary transmitter and receiver. Also, the secondary relay network operates in channel state information assisted AF mode, and the signals undergo independent Nakagami-m fading. In particular, closed-form expressions for the outage probability and symbol error rate (SER) of the considered network over Nakagami-m fading are presented. More importantly, asymptotic closed-form expressions for the outage probability and SER are derived. These tractable closed-form expressions for the network performance readily enable us to evaluate and examine the impact of network parameters on the system performance. Specifically, the impact of the number of antennas, the fading severity parameters, the channel mean powers, and the peak interference power is addressed. The asymptotic analysis manifests that the peak interference power constraint imposed on the secondary relay network has no effect on the diversity gain. However, the coding gain is affected by the fading parameters of the links from the primary receiver to the secondary relay network.

Place, publisher, year, edition, pages
Wiley, 2015
Keywords
Cognitive radio, Beamforming, Amplify-and-forward relaying, Outage probability, Symbol error rate, Nakagami-m fading
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-6429 (URN)10.1002/wcm.2317 (DOI)000345984800005 ()oai:bth.se:forskinfo8C92EC981AF0EA69C1257AC5006ABBA3 (Local ID)oai:bth.se:forskinfo8C92EC981AF0EA69C1257AC5006ABBA3 (Archive number)oai:bth.se:forskinfo8C92EC981AF0EA69C1257AC5006ABBA3 (OAI)
Available from: 2015-01-20 Created: 2012-11-29 Last updated: 2017-12-04Bibliographically approved
Yuen, C., Elkashlan, M., Qian, Y., Duong, T. Q., Shu, L. & Schmidt, F. (2015). ENERGY HARVESTING COMMUNICATIONS: PART III. IEEE Communications Magazine, 53(8), 90-91
Open this publication in new window or tab >>ENERGY HARVESTING COMMUNICATIONS: PART III
Show others...
2015 (English)In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 53, no 8, p. 90-91Article in journal, Editorial material (Other academic) Published
National Category
Computer Systems
Identifiers
urn:nbn:se:bth-10560 (URN)000359262600010 ()
Available from: 2015-09-15 Created: 2015-09-14 Last updated: 2018-01-16Bibliographically approved
Duong, Q. T., Shu, L., Chen, M., Vo Nguyen Quoc, B. & Dac Binh, H. (2015). Performance analysis of cooperative spatial multiplexing networks with AF/DF relaying and linear receiver over Rayleigh fading channels. Wireless Communications & Mobile Computing, 15(3), 500-509
Open this publication in new window or tab >>Performance analysis of cooperative spatial multiplexing networks with AF/DF relaying and linear receiver over Rayleigh fading channels
Show others...
2015 (English)In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 15, no 3, p. 500-509Article in journal (Refereed) Published
Abstract [en]

Cooperative spatial multiplexing (CSM) system has played an important role in wireless networks by offering a substantial improvement in multiplexing gain compared with its cooperative diversity counterpart. However, there is a limited number of research works that consider the performance of CSM systems. As such, in this paper, we have derived exact performance of CSM with amplify-and-forward and decode-and-forward relays in terms of outage capacity and ergodic capacity. We have shown that CSM systems yield a unity diversity order regardless of the number of antennas at the destination and the number of relays in the networks, which is the direct result of diversity and multiplexing gain trade-off. Our analytical expressions are corroborated by Monte-Carlo simulations.

Place, publisher, year, edition, pages
Elsevier, 2015
Keywords
Amplify-and-forward (AF), Cooperative spatial multiplexing, Decode-and-forward (DF), Ergodic capacity, Outage probability, Relay networks
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-6322 (URN)10.1002/wcm.2363 (DOI)000348141800008 ()oai:bth.se:forskinfo8B01FB9EA5457074C1257B6400361C84 (Local ID)oai:bth.se:forskinfo8B01FB9EA5457074C1257B6400361C84 (Archive number)oai:bth.se:forskinfo8B01FB9EA5457074C1257B6400361C84 (OAI)
Available from: 2015-05-26 Created: 2013-05-07 Last updated: 2017-12-04Bibliographically approved
Han, G., Shen, W., Duong, T. Q., Guizani, M. & Hara, T. (2014). A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks. SECURITY AND COMMUNICATION NETWORKS, 7(12), 2542-2554
Open this publication in new window or tab >>A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks
Show others...
2014 (English)In: SECURITY AND COMMUNICATION NETWORKS, ISSN 1939-0114, Vol. 7, no 12, p. 2542-2554Article in journal (Refereed) Published
Abstract [en]

Traditional security schemes developed for sensor networks are not suitable for cluster-based wireless sensor networks (WSNs) because of their susceptibility to Denial of Service (DoS) attacks. In this paper, we provide a security scheme against DoS attacks (SSAD) in cluster-based WSNs. The scheme establishes trust management with energy character, which leads nodes to elect trusted cluster heads. Furthermore, a new type of vice cluster head node is proposed to detect betrayed cluster heads. Theoretical analyses and simulation results show that SSAD can prevent and detect malicious nodes with high probability of success

Place, publisher, year, edition, pages
Wiley-Blackwell, 2014
Keywords
trust; denial of service; cluster; sensor networks; energy prediction
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-10720 (URN)10.1002/sec.373 (DOI)
Available from: 2015-09-21 Created: 2015-09-21 Last updated: 2017-03-13Bibliographically approved
Han, G., Shen, W., Duong, Q. T., Guizani, M. & Hara, T. (2014). A proposed security scheme against denial of service attacks in cluster-based wireless sensor networks. Security and Communication Networks, 7(12), 2542-2554
Open this publication in new window or tab >>A proposed security scheme against denial of service attacks in cluster-based wireless sensor networks
Show others...
2014 (English)In: Security and Communication Networks, ISSN 1939-0114, E-ISSN 1939-0122, Vol. 7, no 12, p. 2542-2554Article in journal (Refereed) Published
Abstract [en]

Traditional security schemes developed for sensor networks are not suitable for cluster-based wireless sensor networks (WSNs) because of their susceptibility to Denial of Service (DoS) attacks. In this paper, we provide a security scheme against DoS attacks (SSAD) in cluster-based WSNs. The scheme establishes trust management with energy character, which leads nodes to elect trusted cluster heads. Furthermore, a new type of vice cluster head node is proposed to detect betrayed cluster heads. Theoretical analyses and simulation results show that SSAD can prevent and detect malicious nodes with high probability of success

Place, publisher, year, edition, pages
John Wiley & Sons, 2014
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:bth-6274 (URN)10.1002/sec.373 (DOI)000345633500025 ()oai:bth.se:forskinfoEE9B8582271B3DBAC125794500377B06 (Local ID)oai:bth.se:forskinfoEE9B8582271B3DBAC125794500377B06 (Archive number)oai:bth.se:forskinfoEE9B8582271B3DBAC125794500377B06 (OAI)
Available from: 2015-06-25 Created: 2011-11-11 Last updated: 2018-01-11Bibliographically approved
Soffritti, J., Duong, T. Q., Merani, M. L. & Zepernick, H.-J. (2014). Performance Analysis of Randomized Distributed Space-Time Codes over Composite Gamma/Lognormal Fading Channels. In: : . Paper presented at IEEE Vehicular Technology Conference, Vancouver, Canada. IEEE
Open this publication in new window or tab >>Performance Analysis of Randomized Distributed Space-Time Codes over Composite Gamma/Lognormal Fading Channels
2014 (English)Conference paper, Published paper (Refereed)
Abstract [en]

This work investigates the end-to-end performance of randomized distributed space-time codes with complex Gaussian distribution, when employed in a wireless relay network. The relaying nodes are assumed to adopt a decode-and-forward strategy and transmissions are affected by small and large scale fading phenomena. Extremely tight, analytical approximations of the end-to-end symbol error probability and of the end-to-end outage probability are derived and successfully validated through Monte-Carlo simulation. For the high signal-to-noise ratio regime, a simple, closed-form expression for the symbol error probability is further provided.

Place, publisher, year, edition, pages
IEEE, 2014
Keywords
Performance Analysis, Randomized Distributed Space-Time Codes, Composite Fading Channels
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-6556 (URN)000353345400317 ()978-1-4799-4449-1 (ISBN)
Conference
IEEE Vehicular Technology Conference, Vancouver, Canada
Available from: 2014-11-18 Created: 2014-11-17 Last updated: 2017-03-16Bibliographically approved
Yeoh, P. L., Elkashlan, M., Duong, T. Q., Yang, N. & da Costa, D. B. (2014). Transmit Antenna Selection for Interference Management in Cognitive Relay Networks. IEEE Transactions on Vehicular Technology, 63(7), 3250-3262
Open this publication in new window or tab >>Transmit Antenna Selection for Interference Management in Cognitive Relay Networks
Show others...
2014 (English)In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 63, no 7, p. 3250-3262Article in journal (Refereed) Published
Abstract [en]

We propose transmit antenna selection (TAS) in decode-and-forward (DF) relaying as an effective approach to reduce the interference in underlay spectrum sharing networks with multiple primary users (PUs) and multiple antennas at the secondary users (SUs). We compare two distinct protocols: 1) TAS with receiver maximal-ratio combining (TAS/MRC) and 2) TAS with receiver selection combining (TAS/SC). For each protocol, we derive new closed-form expressions for the exact and asymptotic outage probability with independent Nakagami-m fading in the primary and secondary networks. Our results are valid for two scenarios related to the maximum SU transmit power, i.e., P, and the peak PU interference temperature, i.e., Q. When P is proportional to Q, our results confirm that TAS/MRC and TAS/SC relaying achieve the same full diversity gain. As such, the signal-to-noise ratio (SNR) advantage of TAS/MRC relaying relative to TAS/SC relaying is characterized as a simple ratio of their respective SNR gains. When P is independent of Q, we find that an outage floor is obtained in the large P regime where the SU transmit power is constrained by a fixed value of Q. This outage floor is accurately characterized by our exact and asymptotic results.

Place, publisher, year, edition, pages
IEEE Vehicular Technology Society, 2014
Keywords
Cognitive radio, relays, spectrum sharing
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-10719 (URN)10.1109/TVT.2014.2298387 (DOI)000342422300024 ()
Available from: 2015-09-21 Created: 2015-09-21 Last updated: 2017-12-04Bibliographically approved
Chu, T. M., Phan, H., Duong, Q. T., Elkashlan, M. & Zepernick, H.-J. (2013). Beamforming Transmission in Cognitive AF Relay Networks with Feedback Delay. In: : . Paper presented at International Conference on IEEE Computing, Management and Telecommunications (IEEE ComManTel). Ho Chi Minh City: IEEE
Open this publication in new window or tab >>Beamforming Transmission in Cognitive AF Relay Networks with Feedback Delay
Show others...
2013 (English)Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we investigate the effect of feedback delay on outage probability (OP) and symbol error rate (SER) of cognitive amplify-and-forward (AF) relay networks with beamforming transmission in Rayleigh fading environment. It is assumed that the secondary transmitter and the secondary receiver are equipped with multiple antennas, whereas the relay and the primary user comprise of a single antenna. Furthermore, in this system, the secondary users use the underlay scheme in which the secondary transmitter and the relay can coexist with the primary user as long as their interference caused to the primary receiver is below a predefined threshold. Through our analysis, numerical results are provided to show the level of degradation of cognitive AF relay systems in proportion to the degree of feedback delay. In addition, we also present the effect of the number of antennas at the secondary transceiver on the performance of the considered system.

Place, publisher, year, edition, pages
Ho Chi Minh City: IEEE, 2013
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-6961 (URN)000318220400022 ()oai:bth.se:forskinfo613B1F55EB77D772C1257B9400306393 (Local ID)978-1-4673-2088-7 (ISBN)oai:bth.se:forskinfo613B1F55EB77D772C1257B9400306393 (Archive number)oai:bth.se:forskinfo613B1F55EB77D772C1257B9400306393 (OAI)
Conference
International Conference on IEEE Computing, Management and Telecommunications (IEEE ComManTel)
Available from: 2013-06-24 Created: 2013-06-24 Last updated: 2017-03-16Bibliographically approved
Bao, V. N., Duong, Q. T., da Costa, D. B., Alexandropoulos, G. C. & Nallanathan, A. (2013). Cognitive Amplify-and-Forward Relaying with Best Relay Selection in Non-Identical Rayleigh Fading. IEEE Communications Letters, 17(3), 475-478
Open this publication in new window or tab >>Cognitive Amplify-and-Forward Relaying with Best Relay Selection in Non-Identical Rayleigh Fading
Show others...
2013 (English)In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 17, no 3, p. 475-478Article in journal (Refereed) Published
Abstract [en]

This paper investigates several important performance metrics of cognitive amplify-and-forward (AF) relay networks with a best relay selection strategy and subject to nonidentical Rayleigh fading. In particular, assuming a spectrum sharing environment consists of one secondary user (SU) source,K SU relays, one SU destination, and one primary user (PU) receiver, closed-form expressions for the outage probability (OP), average symbol error probability (SEP), and ergodic capacity of the SU network are derived. The correctness of the proposed analysis is corroborated via Monte Carlo simulations and readily allows us to evaluate the impact of the key system parameters on the end-to-end performance. An asymptotic analysis is also carried out and reveals that the diversity gain is defined by the number of relays pertaining to the SU network (i.e., K), being therefore not affected by the interference power constraint of the PU network.

Place, publisher, year, edition, pages
IEEE, 2013
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-6887 (URN)10.1109/LCOMM.2013.011513.122213 (DOI)000316806700012 ()oai:bth.se:forskinfo7435A2F0F10F8D98C1257BC70076A3FA (Local ID)oai:bth.se:forskinfo7435A2F0F10F8D98C1257BC70076A3FA (Archive number)oai:bth.se:forskinfo7435A2F0F10F8D98C1257BC70076A3FA (OAI)
Available from: 2013-09-16 Created: 2013-08-14 Last updated: 2017-12-04Bibliographically approved
Organisations

Search in DiVA

Show all publications