Louis Sibomana

Louis Sibomana
University of Rwanda

PhD

About

31
Publications
1,274
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
169
Citations
Introduction

Publications

Publications (31)
Article
Full-text available
Biogas is a renewable energy source that comes from biological waste. In the biogas generation process, various factors such as feedstock composition, digester volume, and environmental conditions are vital in ensuring promising production. Accurate prediction of biogas yield is crucial for improving biogas operation and increasing energy yield. Th...
Article
Full-text available
Internet of Things (IoT) based healthcare applications are time‐sensitive and any delay can cause alarming situations, including death of patients. The Earliest Deadline First (EDF) scheduling scheme has been proposed for use in IoT‐based healthcare applications. However, the EDF scheme performs poorly under overloaded conditions due to giving high...
Article
Full-text available
Previous studies have considered scheduling schemes for Internet of Things (IoT)-based healthcare systems like First Come First Served (FCFS), and Shortest Job First (SJF). However, these scheduling schemes have limitations that range from large requests starving short requests, process starvation that results in long time to complete if short proc...
Article
This paper presents a queueing analytical framework for the performance evaluation of the secondary user (SU) packet transmission with service differentiation in a point-to- multipoint underlay cognitive radio network. The transmit power of the SU transmitter is subject to the joint outage constraint imposed by the primary user receivers (PU-Rxs) a...
Data
Full-text available
In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multi...
Conference Paper
In this paper, we study the performance of point-to-point communication in spectrum sharing systems under the peak interference power constraint of multiple primary users. In particular, we assume that the channels undergo independent but not necessarily identically distributed Nakagami-m fading with integer values of fading severity parameter m. T...
Article
In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multi...
Article
This paper analyzes the ergodic capacity of secondary point-to-multipoint communications under the outage constraint of multiple primary user receivers (PU-Rxs) and the secondary user (SU) maximum transmit power limit. We first derive analytical expressions of the ergodic capacity for three scheduling schemes, that is, round robin, Max-signal-to-in...
Conference Paper
This paper analyses the performance of an underlay cognitive radio network (CRN) over α-μ fading channels in terms of symbol error probability (SEP) and effective capacity (EC). The α-μ distribution allows for a more general fading model with an increased level of generality compared to well-known models such as Nakagami-m and Rayleigh fading. The...
Conference Paper
In this paper, we consider a point-to-multipoint underlay cognitive radio network under the joint constraint of the primary user peak interference power and maximum transmit power limit of the secondary user (SU). Analytical expressions for the secondary outage capacity are obtained based on exact as well as approximate expressions of the first and...
Conference Paper
This paper analyzes the secondary network performance under the joint constraint of the primary user (PU) peak interference power and maximum transmit power limit of the secondary user (SU). In particular, N SU transmitters (SU-Txs) communicate with an SU receiver in the presence of a primary network with a PU transmitter and multiple PU receivers....
Article
In this paper, we analyze the packet transmission time in a cognitive cooperative radio network (CCRN) where a secondary transmitter (SU-Tx) sends packets to a secondary receiver (SU-Rx) with the help of a secondary relay (SR). In particular, we assume that the SU-Tx and the SR are subject to the joint constraint of the timeout probability of the p...
Conference Paper
This paper analyzes the physical layer security for cognitive relay networks under the peak interference power constraint of the primary user receiver. In particular, a secondary user (SU) transmitter communicates with an SU receiver through the help of multiple secondary relays (SRs) using a decode-and-forward (DF) protocol. There exist multiple e...
Conference Paper
In this paper, we consider a secondary network with simultaneous wireless information and power transfer in a spectrum sharing scenario. In particular, a secondary user (SU) transmitter communicates with multiple SU receivers (SU-Rxs) under the peak interference power constraint of the primary user receiver and the SU maximum transmit power limit....
Conference Paper
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) transmitter (SU-Tx) communicates with multiple SU receivers (SU-Rxs). There exist multiple eavesdroppers (EAVs) who illegally listen to the secondary network communication. Further, the primary network consists of a primary user (PU) transmitter servin...
Article
Recently, spectrum sharing has been considered as a promising solution to improve the spectrum utilization. It however may be vulnerable to security problems as the primary and secondary network access the same resource. Therefore, in this paper, we focus on the performance analysis of a cognitive radio network in the presence of an eavesdropper (E...
Conference Paper
In this paper, we consider a spectrum sharing system where a secondary user (SU) transmitter (SU-Tx) communicates with an SU receiver (SU-Rx) with the help of multiple secondary relays (SRs) in the presence of a single primary network link. In particular, the SU-Tx and SR are subject to their maximum transmit power limits and the timeout constraint...
Conference Paper
In this paper, we consider an uplink spectrum sharing cognitive radio network (CRN). In particular, we assume that μ secondary user (SU) transmitters (SU-Txs) communicate with an SU receiver (SU-Rx) in the presence of a single primary link. Under the joint constraint of the primary user (PU) outage probability and SU-Tx maximum transmit power, the...
Conference Paper
In this paper, we analyze the performance of a cognitive radio network (CRN) that is assisted by a single relay. In particular, the secondary user (SU) transmitter (SU-Tx) and the secondary relay (SR) utilize the licensed frequency band of the primary user (PU). To protect the PU from harmful interference, the SU-Tx and SR must regulate their trans...
Conference Paper
In this paper, we investigate a downlink model for underlay cognitive radio networks (CRNs). In particular, we assume that the secondary transmitter (SU-Tx) sends common packets to secondary receivers (SU-Rx) under the outage constraint of a single primary user (PU) and the peak transmit power constraint of the SU-Tx. All channels undergo Rayleigh...
Conference Paper
In this paper, we consider a spectrum sharing cognitive radio network (CRN) in the presence of an eavesdropper (EAV) who illegally listens to the primary user (PU) communication. Under the PU outage and the secondary user (SU) peak transmit power constraints, the adaptive transmit power policy of the SU transmitter (SU-Tx) is obtained. Then, expres...
Conference Paper
In this paper, we analyze the secondary network transmission given a packet timeout threshold and a target bit error rate (BER) in a downlink multiservice spectrum sharing cognitive radio network (CRN). Under the joint constraint of primary user (PU) outage probability and secondary user (SU) peak transmit power, the adaptive transmit power policy...

Network

Cited By