{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:55:07Z","timestamp":1753883707165,"version":"3.41.2"},"reference-count":24,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T00:00:00Z","timestamp":1348099200000},"content-version":"vor","delay-in-days":263,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"name":"University of Catalonia","award":["IC0905"],"award-info":[{"award-number":["IC0905"]}]},{"name":"Terra","award":["IC0905"],"award-info":[{"award-number":["IC0905"]}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Journal of Electrical and Computer Engineering"],"published-print":{"date-parts":[[2012,1]]},"abstract":"<jats:p>The spatiotemporal robustness of the MIMO transmissions is exploited aiming at inducing opportunistic secondary communications on the primary radio resources. The proposed model makes use of the smallest singular values and the Extreme Value Theory for characterizing the robustness of the MIMO systems, having always the premise of preventing significant degradations in the performance of the primary communications, while at the same time an attractive number of potential opportunities for secondary are intended to be offered. So, the idea behind the suggested scheme consists in reusing the information that is already available within the primary MIMO networks aiming at cotransmitting opportunistically in a clever manner, which at the end will allow us to make a much more efficient use of both the natural and technical resources.<\/jats:p>","DOI":"10.1155\/2012\/909540","type":"journal-article","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T21:03:36Z","timestamp":1348175016000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the Reusage of Primary Radio Resources through  the Exploitation of the Spatiotemporal Robustness of  the MIMO Transmissions"],"prefix":"10.1155","volume":"2012","author":[{"given":"G. A.","family":"Medina-Acosta","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 A.","family":"Delgado-Pen\u00edn","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2012,9,20]]},"reference":[{"key":"e_1_2_7_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.01.001"},{"key":"e_1_2_7_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"e_1_2_7_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.929367"},{"key":"e_1_2_7_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090109"},{"key":"e_1_2_7_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481338"},{"key":"e_1_2_7_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.361604"},{"key":"e_1_2_7_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.810646"},{"key":"e_1_2_7_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1341263"},{"key":"e_1_2_7_9_2","first-page":"53","article-title":"Breaking the barriers of Shannon\u2019s capacity: an overview of MIMO wireless systems","volume":"98","author":"Gesbert D.","year":"2002","journal-title":"Telektronikk"},{"key":"e_1_2_7_10_2","doi-asserted-by":"publisher","DOI":"10.1002\/9780470745489"},{"key":"e_1_2_7_11_2","unstructured":"MyungH. G. Introduction to Single Carrier FDMA Proceedings of the 15th European Signal Processing Conference (EUSIPCO \u203207) September 2007 Poznan Poland."},{"key":"e_1_2_7_12_2","unstructured":"MyungH. G. Single carrier orthogonal multiple access technique for broadband wireless communications [Ph.D. dissertation] 2007 Department of Electrical and Computer Polytechnic University Brooklyn NY USA."},{"key":"e_1_2_7_13_2","doi-asserted-by":"crossref","unstructured":"BerardinelliG. S\u00f8rensenT. B. MogensenP. andPajukoskiK. SVD-based vs. Release 8 codebooks for single user MIMO LTE-A uplink Proceedings of the IEEE 71st Vehicular Technology Conference (VTC \u203210) May 2010 1\u20135 2-s2.0-77954920926 https:\/\/doi.org\/10.1109\/VETECS.2010.5493709.","DOI":"10.1109\/VETECS.2010.5493709"},{"key":"e_1_2_7_14_2","unstructured":"WangP. LTE Physical Layer Overview 2011 http:\/\/www\u2010ee.uta.edu\/Online\/PWang\/ee5368\/Spring2011\/Review%20_2_LTE%20Physical%20Layer%20Overview_01162011.pdf."},{"key":"e_1_2_7_15_2","unstructured":"BurelG. Statistical analysis of the smallest singular value in MIMO transmission system Proceedings of the International Conference on Signal Speech and Image Processing (WSEAS \u203202) September 2002 Skiathos Island Greece."},{"volume-title":"Extreme Value Theory in Engineering","year":"1998","author":"Castillo E.","key":"e_1_2_7_16_2"},{"key":"e_1_2_7_17_2","unstructured":"3GPP TS 36.101 V9.4.0 User Equipment (UE) radio transmission and reception 2010."},{"key":"e_1_2_7_18_2","unstructured":"3GPP TR 25.814 V7.1.0 Physical Layer aspects for evolved Universal Terrestrial Radio Access (UTRA) 2006."},{"key":"e_1_2_7_19_2","unstructured":"3GPP TS 36.211 V9.1.0 Physical Channels and Modulation 2010."},{"key":"e_1_2_7_20_2","unstructured":"3GPP TR 25.943 V9.0.0 Technical Specification Group Radio Access Network: Deployment aspects 2009."},{"key":"e_1_2_7_21_2","unstructured":"ChenZ. WangC.-X. HongX.et al. Interference Mitigation for cognitive radio MIMO systems based on practical precoding to appear inIEEE Transactions on Vehicular Technology http:\/\/arxiv.org\/abs\/1104.4155v1."},{"key":"e_1_2_7_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.080528"},{"key":"e_1_2_7_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2007.914894"},{"key":"e_1_2_7_24_2","doi-asserted-by":"crossref","unstructured":"HuangH. ZhangZ. ChengP. YuG. andQuiO. Throughput analysis of cognitive MIMO system Proceedings of the International Workshop on Cross Layer Design (IWCLD \u203207) September2007 Jinan China.","DOI":"10.1109\/IWCLD.2007.4379034"}],"container-title":["Journal of Electrical and Computer Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2012\/909540.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2012\/909540.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2012\/909540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T12:29:54Z","timestamp":1718195394000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2012\/909540"}},"subtitle":[],"editor":[{"given":"Ghazanfar Ali","family":"Safdar","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1155\/2012\/909540"],"URL":"https:\/\/doi.org\/10.1155\/2012\/909540","archive":["Portico"],"relation":{},"ISSN":["2090-0147","2090-0155"],"issn-type":[{"type":"print","value":"2090-0147"},{"type":"electronic","value":"2090-0155"}],"subject":[],"published":{"date-parts":[[2012,1]]},"assertion":[{"value":"2012-06-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-08-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-09-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"909540"}}