Hans-Jürgen Zepernick

Hans-Jürgen Zepernick
Blekinge Institute of Technology | BTH

Dr.-Ing.

About

428
Publications
49,169
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,281
Citations
Additional affiliations
October 2004 - present
Blekinge Institute of Technology
Position
  • Professor of Radio Communications

Publications

Publications (428)
Article
In this article, we consider a multiagent unmanned aerial vehicle (UAV)-aided system employing mobile edge computing (MEC) servers to satisfy the requirement of ultrareliable low latency communications (URLLCs) in intelligent autonomous transport applications. Our MEC architecture aims to guarantee quality-of-service (QoS) by investigating task off...
Article
In this paper, we consider an Internet-of-Things network supported by several satellites and multiple cache-assisted unmanned aerial vehicles (UAVs). Due to the long-distance transmission and detrimental effects from the transmission environment, the latency can be extremely high, especially in the presence of backhaul congestion. Therefore, we for...
Article
Full-text available
Immersive media such as virtual reality, augmented reality, and 360◦ video have seen tremendous technological developments in recent years. Furthermore, the advances in head-mounted displays (HMDs) offer the users increased immersive experiences compared to conventional displays. To develop novel immersive media systems and services that satisfy th...
Article
Full-text available
All virtual reality (VR) systems have some inherent hand-controller latency even when operated locally. In remotely rendered VR, additional latency may be added due to the remote transmission of data, commonly conducted through shared low-capacity channels. Increased latency will negatively affect the performance of the human VR operator, but the l...
Conference Paper
Full-text available
During the last decade, we have witnessed a rapid development of extended reality (XR) technologies such as augmented reality (AR) and virtual reality (VR). Further, there have been tremendous advancements in artificial intelligence (AI) and machine learning (ML). These two trends will have a significant impact on future digital societies. The visi...
Article
Full-text available
The emerging 5G mobile networks are essential enablers for mobile virtual reality (VR) video streaming applications assuring high quality of experience (QoE) at the end-user. In addition, mobile edge computing brings computational resources closer to the user equipment (UE), which allows offloading computationally intensive processing. In this pape...
Article
Full-text available
Data hiding or information hiding is a prominent class of information security that aims at reliably conveying secret data embedded in a cover object over a covert channel. Digital media such as audio, image, video, and three-dimensional (3D) media can act as cover objects to carry such secret data. Digital media security has acquired tremendous si...
Article
Full-text available
Emerging 5G and future 6G mobile networks are expected to cater for high mobility scenarios ranging from vehicle-to-vehicle communications to unmanned aerial vehicles and airborne platforms. Communications in this type of deployments suffer from severe Doppler shifts which require new modulation waveforms. Orthogonal time frequency space (OTFS) mod...
Article
Full-text available
Wireless virtual reality (VR) offers a seamless user experience but has to cope with higher sensitivity to temporal impairments induced on the wireless link. Apart from bandwidth dynamics and latency, video freezes and their lengths are important temporal performance indicators that impact on the quality of experience (QoE) of networked VR applicat...
Conference Paper
The COVID-19 pandemic has induced dramatic effects in all areas of society worldwide. It has led to drastic restrictions on academic exchanges and caused research projects to be put on hold. The need to maintain social distancing has severely affected the research communities that rely on in-person studies. In particular, Quality of Experience (QoE...
Article
Full-text available
In this paper, we propose a viewing direction based least significant bit (LSB) data hiding method for 360 • videos. The distributions of viewing direction frequency for latitude and longitude are used to control the amount of secret data to be hidden at the latitude, longitude, or both latitude and longitude of 360 • videos. Normalized Gaussian mi...
Article
Full-text available
Due to the advances in head-mounted displays (HMDs), hardware and software technologies, and mobile connectivity, virtual reality (VR) applications such as viewing 360∘ videos on HMDs have seen an increased interest in a wide range of consumer and vertical markets. Quality assessment of digital media systems and services related to immersive visual...
Preprint
Full-text available
Developing products, services and vertical applications for the future digitized society in the 6G era requires a multidisciplinary approach and a re-definition of how we create, deliver and consume network resources, data and services for both communications and sensing purposes. This development will change and disrupt the traditional business mo...
Preprint
Full-text available
The focus of this white paper is on machine learning (ML) in wireless communications. 6G wireless communication networks will be the backbone of the digital transformation of societies by providing ubiquitous, reliable, and near-instant wireless connectivity for humans and machines. Recent advances in ML research has led enable a wide range of nove...
Article
Full-text available
In this paper, we examine the sensitivity of the digital multimedia broadcasting (DMB) MPEG-2 transport stream (TS) format to transmission errors. To find the sensitivity of different parts of TS packets to transmission errors, each TS packet is divided into four cells, i.e., the first three cells comprising 48 bytes each and the last cell is of 44...
Article
Full-text available
In this paper, we consider a two-way cognitive cooperative radio network (TW-CCRN) with hybrid interweaveunderlay spectrum access in the presence of imperfect spectrum sensing. Power allocation strategies are proposed that maximize the sum-rate and minimize the outage probability of the hybrid TW-CCRN. Specifically, based on the state of the primar...
Article
In this paper, we study a power-domain nonorthogonal multiple access (NOMA) system in which a base station (BS) superimposes the transmit signals to the users. To enhance spectral efficiency and link reliability for the far-distance user, a full-duplex (FD) relay assists the BS while the neardistance user is reached over the direct link. For this s...
Article
Full-text available
In this paper, two optimal power allocation strategies for hybrid interweave-underlay cognitive cooperative radio networks (CCRNs) are proposed to maximize channel capacity and minimize outage probability. The proposed power allocation strategies are derived for the case of Rayleigh fading taking into account the impact of imperfect spectrum sensin...
Article
This paper presents a queueing analytical framework for the performance evaluation of the secondary user (SU) packet transmission with service differentiation in a point-to- multipoint underlay cognitive radio network. The transmit power of the SU transmitter is subject to the joint outage constraint imposed by the primary user receivers (PU-Rxs) a...
Chapter
Modern optimization problems in economics, medicine, and engineering are becoming more complicated and have a convoluted search space with multiple minima. These problems are multimodal with objective functions exhibiting multiple peaks, valleys, and hyperplanes of varying heights. Furthermore, they are nonlinear, non-smooth, non-quadratic, and can...
Conference Paper
In this paper, we study the performance of point-to-point communication in spectrum sharing systems under the peak interference power constraint of multiple primary users. In particular, we assume that the channels undergo independent but not necessarily identically distributed Nakagami-m fading with integer values of fading severity parameter m. T...
Conference Paper
In this paper, we study the outage probability of an opportunistic multiple relay communication system over κ-μ shadowed fading channels for both amplify-and-forward and decode-and-forward relaying protocols. We first provide an exact analysis of the impact of κ-μ shadowed fading on the outage probability of the system. To simplify the obtained ana...
Article
Full-text available
This paper proposes a novel hybrid interweave-underlay spectrum access for a cognitive amplify-and-forward relay network where the relay forwards the signals of both the primary and secondary networks. In particular, the secondary network (SN) opportunistically operates in interweave spectrum access mode when the primary network (PN) is sensed to b...
Article
This paper analyzes the ergodic capacity of secondary point-to-multipoint communications under the outage constraint of multiple primary user receivers (PU-Rxs) and the secondary user (SU) maximum transmit power limit. We first derive analytical expressions of the ergodic capacity for three scheduling schemes, that is, round robin, Max-signal-to-in...

Network

Cited By