The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate the effects of interference among the cell edge users under cooperative non-orthogonal multiple access (NOMA) system. The base stations (BSs) cooperative with each other for downlink transmission. The information rate of cell-edge users (CEU) are derived for two system models: first model with inter-user (i.e., Users on the same cell edge) interference only and second...
This paper aims to analyze and evaluate the performance of fixed gain amplify-and-forward (AF) cooperative diversity multiple-input multiple-output (MIMO) relay systems over flat fading Rayleigh channels. Diversity is achieved through using orthogonal space-time block coding technique (OSTBC) at the transmitter. OSTBC is used to encode a BPSK modulated signal before being transmitted through the channel...
As mobile ad-hoc networks (MANETs) continue to receive an increasing attention in research due to its vast amount of applications, security is becoming one of the main research challenges. Most of the proposed research in MANET security focused on secure routing and key management. In this paper, we propose an access control mechanism with features that is inherited to produce a secure address auto-configuration...
The concept of Device-to-Device (D2D) communication has been introduced for local area connectivity as a means to improve the cellular spectrum utilization and to reduce the energy consumption of user equipments. The performance of D2D communication is practically limited due to large distance and/or poor channel conditions between the D2D transmitter and receiver. To overcome these issues, a relay-assisted...
In this paper we consider the 1-movable dominating set problem in wireless sensor networks (WSNs), motivated by applications of WSNs such as detection of environmental activity, surveillance, area monitoring and attaining small degree of fault tolerance in such applications. To find a minimum 1-movable dominating set is shown to be NP-complete. Hence, in this paper we design centralized and distributed...
We describe a deterministic and a randomized distributed algorithm for computing a spanning tree over a wireless network whose weight approximates the weight of a Minimum Spanning Tree (MST). The network is composed of n static nodes embedded in a 2-dimensional Euclidean space which communicate according to the Signal-to-Interference- and-Noise Ratio (SINR) model. Under the assumption that each node...
Many of the models used to analyze the performance of wireless networks assume stationary traffic behaviors where the average state-changing event times are constant. Various analysis of real traffic traces have shown that such behaviors in mobile wireless networks vary periodically during the day and night. Other systems also exhibit a similar behavior. A better analysis of the network's performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.