The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a cellular architecture that combines multiuser MIMO downlink with opportunistic use of unlicensed Industrial, Scientific, and Medical Radio (ISM) bands to establish device-to-device (D2D) cooperation. The architecture consists of a physical-layer cooperation scheme based on forming downlink virtual MIMO channels through D2D relaying, and a novel resource allocation strategy for such D2D-enabled...
We study opportunistic scheduling and the sum capacity of cellular networks with a full-duplex multi-antenna base station and a large number of single-antenna half-duplex users. Simultaneous uplink and downlink over the same band results in uplink-to-downlink interference, degrading performance. We present a simple opportunistic joint uplink-downlink scheduling algorithm that exploits multiuser diversity...
Wireless sensor nodes positions perform a crucial role in various sensor network applications. Localization of sensor node in WSN includes security problems such as node re-authentication and movement tracing. Various techniques have been proposed in recent times to solve the location problems of usual sensors but poor to support hostile and dynamic environments as their blueprints are only for the...
Sensor nodes' locations perform a vital role in many sensor network applications. Localization of sensor node in Wireless Sensor Networks adds security issues such as node re-authentication and tracing the movement. A number of techniques have been proposed recently to solve the locations issues of regular sensors but inadequate to support hostile and dynamic environments since their designs are only...
Deployment of Femtocell Base Stations a.k.a Femtos for improving network coverage and data rates in indoors is an emerging practice in cellular systems. However, if Femtos are not placed optimally they do not provide these improvements, thus defeating the purpose of their deployment in indoors in the first place. In this paper, we propose a novel heuristic solution for Femto placement which guarantees...
Survivability represents an important property of an information system which must withstand devastating malicious attacks and system failures, as well as continuously provide essential services to users. In this paper, we qualitatively analyze a system's states under different levels of attacks with varying system recovery abilities. Then, we use Colored Petri Net tools to simulate and measure the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.