The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Cognitive radio network, the efficiency of spectrum utilization can be improved using dynamic spectrum access. In this paper three dimension markov model with finite primary users and infinite secondary users is proposed through two different classical channel access techniques: the random channel scheme and the reservation channel scheme assignment to evaluate the impact of changing the arrival...
Orthogonal Frequency Division Multiplexing (OFDM) is an attractive technique for wireless communication over frequency-selective fading channels. OFDM suffers from high Peak-to-Average Power Ratio (PAPR), which limits OFDM usage and reduces the efficiency of High Power Amplifier (HPA) or badly degrades BER. Many PAPR reduction techniques have been proposed in the literature. PAPR reduction techniques...
Since the dynamic behavior of wireless networks inherits different communication patterns for the execution processes of the desired parallel tasks and the occurrence processes of handoff operations, the available reliability metrics are not applicable to study and analyze such networks. Therefore, in this paper, we propose a novel Petri net modeling methodology for accurately calculating...
Data encryption has become a vital need for protecting the user data in most of communication areas. Advanced Encryption Standard (AES) algorithm has become the optimum choice for various security services in numerous applications due to its reliability and flexibility. The AES algorithm faces two main challenges which included in both encryption/decryption speed, and the consumed implementation area...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.