Hans-Jürgen Zepernick

Hans-Jürgen Zepernick
Blekinge Institute of Technology | BTH

Dr.-Ing.

About

397
Publications
38,873
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,711
Citations
Citations since 2016
80 Research Items
1835 Citations
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
Additional affiliations
October 2004 - present
Blekinge Institute of Technology
Position
  • Professor of Radio Communications

Publications

Publications (397)
Article
Full-text available
The emerging 5G mobile networks are essential enablers for mobile virtual reality (VR) video streaming applications assuring high quality of experience (QoE) at the end-user. In addition, mobile edge computing brings computational resources closer to the user equipment (UE), which allows offloading computationally intensive processing. In this pape...
Article
Full-text available
Data hiding or information hiding is a prominent class of information security that aims at reliably conveying secret data embedded in a cover object over a covert channel. Digital media such as audio, image, video, and three-dimensional (3D) media can act as cover objects to carry such secret data. Digital media security has acquired tremendous si...
Article
Full-text available
Emerging 5G and future 6G mobile networks are expected to cater for high mobility scenarios ranging from vehicle-to-vehicle communications to unmanned aerial vehicles and airborne platforms. Communications in this type of deployments suffer from severe Doppler shifts which require new modulation waveforms. Orthogonal time frequency space (OTFS) mod...
Article
Full-text available
Wireless virtual reality (VR) offers a seamless user experience but has to cope with higher sensitivity to temporal impairments induced on the wireless link. Apart from bandwidth dynamics and latency, video freezes and their lengths are important temporal performance indicators that impact on the quality of experience (QoE) of networked VR applicat...
Conference Paper
The COVID-19 pandemic has induced dramatic effects in all areas of society worldwide. It has led to drastic restrictions on academic exchanges and caused research projects to be put on hold. The need to maintain social distancing has severely affected the research communities that rely on in-person studies. In particular, Quality of Experience (QoE...
Article
Full-text available
In this paper, we propose a viewing direction based least significant bit (LSB) data hiding method for 360 • videos. The distributions of viewing direction frequency for latitude and longitude are used to control the amount of secret data to be hidden at the latitude, longitude, or both latitude and longitude of 360 • videos. Normalized Gaussian mi...
Article
Full-text available
Due to the advances in head-mounted displays (HMDs), hardware and software technologies, and mobile connectivity, virtual reality (VR) applications such as viewing 360∘ videos on HMDs have seen an increased interest in a wide range of consumer and vertical markets. Quality assessment of digital media systems and services related to immersive visual...
Preprint
Full-text available
Developing products, services and vertical applications for the future digitized society in the 6G era requires a multidisciplinary approach and a re-definition of how we create, deliver and consume network resources, data and services for both communications and sensing purposes. This development will change and disrupt the traditional business mo...
Preprint
Full-text available
The focus of this white paper is on machine learning (ML) in wireless communications. 6G wireless communication networks will be the backbone of the digital transformation of societies by providing ubiquitous, reliable, and near-instant wireless connectivity for humans and machines. Recent advances in ML research has led enable a wide range of nove...
Article
Full-text available
In this paper, we examine the sensitivity of the digital multimedia broadcasting (DMB) MPEG-2 transport stream (TS) format to transmission errors. To find the sensitivity of different parts of TS packets to transmission errors, each TS packet is divided into four cells, i.e., the first three cells comprising 48 bytes each and the last cell is of 44...
Article
In this paper, we consider a two-way cognitive cooperative radio network (TW-CCRN) with hybrid interweaveunderlay spectrum access in the presence of imperfect spectrum sensing. Power allocation strategies are proposed that maximize the sum-rate and minimize the outage probability of the hybrid TW-CCRN. Specifically, based on the state of the primar...
Article
In this paper, two optimal power allocation strategies for hybrid interweave-underlay cognitive cooperative radio networks (CCRNs) are proposed to maximize channel capacity and minimize outage probability. The proposed power allocation strategies are derived for the case of Rayleigh fading taking into account the impact of imperfect spectrum sensin...
Article
This paper presents a queueing analytical framework for the performance evaluation of the secondary user (SU) packet transmission with service differentiation in a point-to- multipoint underlay cognitive radio network. The transmit power of the SU transmitter is subject to the joint outage constraint imposed by the primary user receivers (PU-Rxs) a...
Chapter
Modern optimization problems in economics, medicine, and engineering are becoming more complicated and have a convoluted search space with multiple minima. These problems are multimodal with objective functions exhibiting multiple peaks, valleys, and hyperplanes of varying heights. Furthermore, they are nonlinear, non-smooth, non-quadratic, and can...
Conference Paper
In this paper, we study the performance of point-to-point communication in spectrum sharing systems under the peak interference power constraint of multiple primary users. In particular, we assume that the channels undergo independent but not necessarily identically distributed Nakagami-m fading with integer values of fading severity parameter m. T...
Conference Paper
In this paper, we study the outage probability of an opportunistic multiple relay communication system over κ-μ shadowed fading channels for both amplify-and-forward and decode-and-forward relaying protocols. We first provide an exact analysis of the impact of κ-μ shadowed fading on the outage probability of the system. To simplify the obtained ana...
Article
Full-text available
This paper proposes a novel hybrid interweave-underlay spectrum access for a cognitive amplify-and-forward relay network where the relay forwards the signals of both the primary and secondary networks. In particular, the secondary network (SN) opportunistically operates in interweave spectrum access mode when the primary network (PN) is sensed to b...
Article
This paper analyzes the ergodic capacity of secondary point-to-multipoint communications under the outage constraint of multiple primary user receivers (PU-Rxs) and the secondary user (SU) maximum transmit power limit. We first derive analytical expressions of the ergodic capacity for three scheduling schemes, that is, round robin, Max-signal-to-in...
Article
To cope with the rapid growth of multimedia applications that requires dynamic levels of quality of service (QoS), cross-layer (CL) design, where multiple protocol layers are jointly combined, has been considered to provide diverse QoS provisions for mobile multimedia networks. However, there is a lack of a general mathematical framework to model s...
Article
Full-text available
In real-time video streaming, video quality can be degraded due to network performance issues. Among other artefacts, video freezing and video jumping are factors that influence user experience. Service providers, operators and manufacturers are interested in evaluating the quality of experience (QoE) objectively because subjective assessment of Qo...
Conference Paper
Full-text available
In this paper, we analyse the performance of a cooperative communication network with multiple piecewise-and-forward (PF) relays on Rayleigh fading channels taking the random nature of the channel variations into account. In particular, the probability density function (PDF) of the received signals at the destination of the considered multiple PF r...
Conference Paper
This paper analyses the performance of an underlay cognitive radio network (CRN) over α-μ fading channels in terms of symbol error probability (SEP) and effective capacity (EC). The α-μ distribution allows for a more general fading model with an increased level of generality compared to well-known models such as Nakagami-m and Rayleigh fading. The...
Conference Paper
In this paper, we consider a point-to-multipoint underlay cognitive radio network under the joint constraint of the primary user peak interference power and maximum transmit power limit of the secondary user (SU). Analytical expressions for the secondary outage capacity are obtained based on exact as well as approximate expressions of the first and...
Article
In this paper, we study the performance of multiple-input multiple-output cognitive amplify-and-forward relay networks using orthogonal space–time block coding over independent Nakagami-m fading. It is assumed that both the direct transmission and the relaying transmission from the secondary transmitter to the secondary receiver are applicable. In...
Article
In this paper, we study the performance of cognitive cooperative radio networks under the peak interference power constraints of multiple primary users (PUs). In particular, we consider a system model where the secondary user communication is assisted by multiple secondary relays (SRs) that operate in the decode-and-forward mode to relay the signal...
Conference Paper
This paper analyzes the secondary network performance under the joint constraint of the primary user (PU) peak interference power and maximum transmit power limit of the secondary user (SU). In particular, N SU transmitters (SU-Txs) communicate with an SU receiver in the presence of a primary network with a PU transmitter and multiple PU receivers....
Article
In this paper, we analyze the packet transmission time in a cognitive cooperative radio network (CCRN) where a secondary transmitter (SU-Tx) sends packets to a secondary receiver (SU-Rx) with the help of a secondary relay (SR). In particular, we assume that the SU-Tx and the SR are subject to the joint constraint of the timeout probability of the p...
Article
In this paper, we analyze the performance of cognitive amplify-and-forward (AF) relay networks with beamforming under the peak interference power constraint of the primary user (PU). We focus on the scenario that beamforming is applied at the multi-antenna secondary transmitter and receiver. Also, the secondary relay network operates in channel sta...
Chapter
Full-text available
The cross-ambiguity function (CAF) relates to the correlation processing of signals in radar, sonar, and communication systems in the presence of delays and Doppler shifts. It is a commonly used tool in the analysis of signals in these systems when both delay and Doppler shifts are present. In this chapter, we aim to tackle the CAF synthesization p...
Conference Paper
This paper analyzes the physical layer security for cognitive relay networks under the peak interference power constraint of the primary user receiver. In particular, a secondary user (SU) transmitter communicates with an SU receiver through the help of multiple secondary relays (SRs) using a decode-and-forward (DF) protocol. There exist multiple e...
Conference Paper
In this paper, we analyze the performance of a cognitive radio network where the secondary transmitter, besides its own transmission, occasionally relays the primary signal. It is assumed that the secondary transmitter employs the exhaustive service mode to transmit the secondary signal and multiple vacations to relay the primary signal. When assis...
Conference Paper
In this paper, we consider a secondary network with simultaneous wireless information and power transfer in a spectrum sharing scenario. In particular, a secondary user (SU) transmitter communicates with multiple SU receivers (SU-Rxs) under the peak interference power constraint of the primary user receiver and the SU maximum transmit power limit....
Conference Paper
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) transmitter (SU-Tx) communicates with multiple SU receivers (SU-Rxs). There exist multiple eavesdroppers (EAVs) who illegally listen to the secondary network communication. Further, the primary network consists of a primary user (PU) transmitter servin...

Network