The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider relay selection technique in a cooperative cellular network where user terminals act as relays to help the communications between a base station (BS) and cell-edge users (CEUs). We firstly build cooperative sets for source mobile users according to their transmission radius. Then, transmission power sets are built for all mobile users according to SNR thresholds. Finally,...
The essence of spectrum allocation is to find an appropriate distribution of spectrum bands among users so that they can coexist. Thus, spectrum allocation can avoid interference that caused by two interference SUs using the same channel. Different spectrum allocation can lead to different network topologies and consequently have effect on the network connectivity. The aim of this paper is twofold:...
Cognitive radio has been suggested as an efficient method for secondary users to promote the efficient utilization of spectrum. Meanwhile, Cooperative relay allows different users or nodes to share resources and to create collaboration through distributed transmission in a wireless networks. The combination of Cognitive radio with cooperative communication could significantly improve the system performance...
In this paper, an error-prone cooperative retransmission strategy (E-CRS) is proposed for wireless networks. In E-CRS, when a receiver can not receive a frame correctly, the retransmission is performed by a cooperative node that overhears the packet successfully, rather than by original source. The throughput of the proposed scheme is analyzed and evaluated in error-prone and no collision channel...
Cognitive radio has been proposed as the means for secondary users to promote the efficient utilization of spectrum. Meanwhile, Cooperative relay is well known as a powerful technology to combat signal fading in a wireless medium. In this paper, we discuss a new relay selection algorithm for cognitive radio ad-hoc networks by utilizing cooperative relay to improve spectrum diversity and transmission...
Communication privacy is becoming an essential security requirement for mission critical communications and communication infrastructure protection. This is especially true for mobile ad hoc networks (MANETs) due to mobility of the communication nodes and the nature of wireless communications. Existing research in privacy-preserving communications can largely be divided into two categories: cryptosystem-based...
With the increase of network service types and userspsila broadband demand, broadband wireless access (BWA) has become the focus of peoplepsilas attention. The workgroup of IEEE 802 proposes the IEEE 802.16 standard to provide BWA. In IEEE802.16 mesh mode, all nodes are organized in an ad hoc fashion. Nodes use a pseudo-random function to compete for their transmission opportunities based on the scheduling...
Energy aware routing protocol plays an important role in the performance of mobile ad hoc networks because mobile hosts in such networks are usually battery-operated. In this paper, based on TORA, we present an energy-aware routing protocol E-TORA. E-TORA selects routes according to hop count and residual energy of nodes. The nodes that have more energy have more probability chosen by E-TORA. Simulation...
In wireless networks there is strong coupling among the traditional layers of the architecture, and these interactions cannot be ignored. One example is the interaction between routing in the network layer and access control in the MAC layer. Another one is the coupling between power control in the physical layer and scheduling in the MAC layer. In this paper, we assume a TDMA-based wireless ad hoc...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.