The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Air bandwidth is a precious resource for wireless communication. Multiple-antenna (MIMO) systems enable an increase in channel capacity without increasing the air bandwidth. An iterative demapping and decoding at the receiver improves the communications performance remarkably. However, MIMO demapping and channel decoding have a high computational complexity. Energy consumption, latency and throughput...
IEEE 802.22 is the first worldwide Wireless Regional Area Networks (WRAN) standard based on cognitive radios (CR). In IEEE 802.22 WRAN, if a wireless microphone appears in any TV channel, the whole channel should be cleaned. 802.22 WRAN devices probably need to fractionally use the first adjacent channel for improving spectrum efficiency while ensuring no harmful interference is caused to the wireless...
We consider the problem of multicasting from a single source to a set of destinations. We assume that the source cannot reach the destinations directly, but must forward its traffic through a set of relays. Under the performance objective of maximizing the common amount of information (number of bits) that the source sends to all destinations per Joule of the total energy spent, we wish to obtain...
Location-awareness is considered a promising technology for use in constructing ubiquitous environments. And, though numerous research works have been devoted to localization problems, there have been relatively few theoretical analyses of network localizations. In this research field, recent research has contributed to finding a unique realization of a network graph G = (V, E) in a 2-dimensional...
The Voronoi diagram is the one of most fundamentals in computation geometry. The coverage control, especially the barrier coverage, will benefit from this diagram. Using the Voronoi diagram, the coverage holes can be detected in short time. In the lax demands which only include the influence of two neighbor sensors, the minimal exposure track based on the Voronoi can approach the optimal. But, because...
Owing to the error propagation, the performance of VBLAST is constrained by the accuracy of the symbols recovered in the previous layer when the traditional detection successive interference cancellation (SIC) algorithm is applied. The performance of VBLAST depends on the performance of the first detected layer. So we proposed a new detection scheme that the first stage is detected with iterative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.