Louis SibomanaUniversity of Rwanda
Louis Sibomana
PhD
About
31
Publications
1,274
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
169
Citations
Introduction
Skills and Expertise
Publications
Publications (31)
Biogas is a renewable energy source that comes from biological waste. In the biogas generation process, various factors such as feedstock composition, digester volume, and environmental conditions are vital in ensuring promising production. Accurate prediction of biogas yield is crucial for improving biogas operation and increasing energy yield. Th...
Internet of Things (IoT) based healthcare applications are time‐sensitive and any delay can cause alarming situations, including death of patients. The Earliest Deadline First (EDF) scheduling scheme has been proposed for use in IoT‐based healthcare applications. However, the EDF scheme performs poorly under overloaded conditions due to giving high...
Previous studies have considered scheduling
schemes for Internet of Things (IoT)-based healthcare systems
like First Come First Served (FCFS), and Shortest Job First
(SJF). However, these scheduling schemes have limitations that
range from large requests starving short requests, process
starvation that results in long time to complete if short proc...
This paper presents a queueing analytical framework for the performance evaluation of the secondary user (SU) packet transmission with service differentiation in a point-to- multipoint underlay cognitive radio network. The transmit power of the SU transmitter is subject to the joint outage constraint imposed by the primary user receivers (PU-Rxs) a...
In this paper, we investigate the physical-layer security
of a secure communication in single-input multiple-output
(SIMO) cognitive radio networks (CRNs) in the presence of
two eavesdroppers. In particular, both primary user (PU) and
secondary user (SU) share the same spectrum, but they face
with different eavesdroppers who are equipped with multi...
In this paper, we study the performance of point-to-point communication in spectrum sharing systems under the peak interference power constraint of multiple primary users. In particular, we assume that the channels undergo independent but not necessarily identically distributed Nakagami-m fading with integer values of fading severity parameter m. T...
In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multi...
This paper analyzes the ergodic capacity of secondary point-to-multipoint communications under the outage constraint of multiple primary user receivers (PU-Rxs) and the secondary user (SU) maximum transmit power limit. We first derive analytical expressions of the ergodic capacity for three scheduling schemes, that is, round robin, Max-signal-to-in...
This paper analyses the performance of an underlay cognitive radio network (CRN) over α-μ fading channels in terms of symbol error probability (SEP) and effective capacity (EC). The α-μ distribution allows for a more general fading model with an increased level of generality compared to well-known models such as Nakagami-m and Rayleigh fading. The...
In this paper, we consider a point-to-multipoint underlay cognitive radio network under the joint constraint of the primary user peak interference power and maximum transmit power limit of the secondary user (SU). Analytical expressions for the secondary outage capacity are obtained based on exact as well as approximate expressions of the first and...
This paper analyzes the secondary network performance under the joint constraint of the primary user (PU) peak interference power and maximum transmit power limit of the secondary user (SU). In particular, N SU transmitters (SU-Txs) communicate with an SU receiver in the presence of a primary network with a PU transmitter and multiple PU receivers....
In this paper, we analyze the packet transmission time in a cognitive cooperative radio network (CCRN) where a secondary transmitter (SU-Tx) sends packets to a secondary receiver (SU-Rx) with the help of a secondary relay (SR). In particular, we assume that the SU-Tx and the SR are subject to the joint constraint of the timeout probability of the p...
This paper analyzes the physical layer security for cognitive relay networks under the peak interference power constraint of the primary user receiver. In particular, a secondary user (SU) transmitter communicates with an SU receiver through the help of multiple secondary relays (SRs) using a decode-and-forward (DF) protocol. There exist multiple e...
In this paper, we consider a secondary network with simultaneous wireless information and power transfer in a spectrum sharing scenario. In particular, a secondary user (SU) transmitter communicates with multiple SU receivers (SU-Rxs) under the peak interference power constraint of the primary user receiver and the SU maximum transmit power limit....
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) transmitter (SU-Tx) communicates with multiple SU receivers (SU-Rxs). There exist multiple eavesdroppers (EAVs) who illegally listen to the secondary network communication. Further, the primary network consists of a primary user (PU) transmitter servin...
Recently, spectrum sharing has been considered as a promising solution to
improve the spectrum utilization. It however may be vulnerable to security
problems as the primary and secondary network access the same resource.
Therefore, in this paper, we focus on the performance analysis of a cognitive
radio network in the presence of an eavesdropper (E...
In this paper, we consider a spectrum sharing system where a secondary user (SU) transmitter (SU-Tx) communicates with an SU receiver (SU-Rx) with the help of multiple secondary relays (SRs) in the presence of a single primary network link. In particular, the SU-Tx and SR are subject to their maximum transmit power limits and the timeout constraint...
In this paper, we consider an uplink spectrum sharing cognitive radio network (CRN). In particular, we assume that μ secondary user (SU) transmitters (SU-Txs) communicate with an SU receiver (SU-Rx) in the presence of a single primary link. Under the joint constraint of the primary user (PU) outage probability and SU-Tx maximum transmit power, the...
In this paper, we analyze the performance of a cognitive radio network (CRN) that is assisted by a single relay. In particular, the secondary user (SU) transmitter (SU-Tx) and the secondary relay (SR) utilize the licensed frequency band of the primary user (PU). To protect the PU from harmful interference, the SU-Tx and SR must regulate their trans...
In this paper, we investigate a downlink model for underlay cognitive radio networks (CRNs). In particular, we assume that the secondary transmitter (SU-Tx) sends common packets to secondary receivers (SU-Rx) under the outage constraint of a single primary user (PU) and the peak transmit power constraint of the SU-Tx. All channels undergo Rayleigh...
In this paper, we consider a spectrum sharing cognitive radio network (CRN) in the presence of an eavesdropper (EAV) who illegally listens to the primary user (PU) communication. Under the PU outage and the secondary user (SU) peak transmit power constraints, the adaptive transmit power policy of the SU transmitter (SU-Tx) is obtained. Then, expres...
In this paper, we analyze the secondary network transmission given a packet timeout threshold and a target bit error rate (BER) in a downlink multiservice spectrum sharing cognitive radio network (CRN). Under the joint constraint of primary user (PU) outage probability and secondary user (SU) peak transmit power, the adaptive transmit power policy...