Browsing by Subject "Analytical expressions"
Now showing items 1-11 of 11
-
A modified stationary reference frame-based predictive current control with zero steady-state error for LCL coupled inverter-based distributed generation systems
( IEEE , 2011 , Article)This paper proposes a modified stationary reference frame-based predictive current controller with zero steady-state error for LCL coupled inverter-based distribution generation systems. Analytical expressions for the ... -
A Novel RIS-Assisted Modulation Scheme
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In this work, in order to achieve higher spectrum efficiency, we propose a reconfigurable intelligent surface (RIS)-assisted multi-user communication uplink system. Different from previous work in which the RIS only optimizes ... -
Amount of Secrecy Loss: A Novel Metric for Physical Layer Security Analysis
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In this letter, we present a novel and important performance metric for analyzing and evaluating the physical layer security of wireless communication systems in the presence of eavesdropping users. Specifically, we introduce ... -
Analysis of cell spectral efficiency of infrastructure relay-enhanced cellular system
( IEEE , 2011 , Conference Paper)In this paper, we investigate the downlink spectral efficiency of infrastructure relay-enhanced cellular systems. In particular, we use the average achieved spectral efficiency at an arbitrary mobile receiver in presence ... -
Cooperative communications scheme with interference management under ICI for OFDM LTE-A systems
( IEEE Computer Society , 2013 , Conference Paper)In long term evolution (LTE) systems, the achievable cell spectral efficiency is often limited by the inter carrier interference (ICI) or coverage shortage of base stations. Hence, in LTE-Advanced, cooperative communication ... -
Full-Duplex Jamming and Interception Analysis of UAV-Based Intrusion Links
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)This letter addresses the evaluation of the performance of a full-duplex (FD) jammer and intercepting node, where the FD node attempts to disrupt the communication link of an intruding unmanned aerial vehicle (UAV). The ... -
Inter-relay interference cancellation for wireless multi-user multi-decode-and-forward relay networks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)In this paper, a cooperative communication scheme with inter-relay interference (IRI) cancellation is proposed for wireless multi-user multi-decode-and-forward (DF) relay networks. The scheme is based on a DF half-duplex ... -
Inter-relay interference management schemes for wireless multi-user decode-and-forward relay networks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)In this paper, two cooperative communications schemes with inter-relay interference (IRI) management are proposed for wireless multi-user decode-and-forward (DF) relay networks. The schemes are based on a DF half-duplex ... -
On the Performance of RIS-Assisted Dual-Hop UAV Communication Systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In this paper, to further improve the coverage and performance of unmanned aerial vehicle (UAV) communication systems, we propose a reconfigurable intelligent surface (RIS)-assisted UAV scheme where an RIS installed on a ... -
Performance analysis for truncated ARQ based DSFBC-CO-OFDM communication scheme
( IEEE , 2011 , Conference Paper)We develop and analyze an ARQ (Automatic Repeat reQuest) based distributed space-frequency block code-orthogonal frequency division multiplexing protocol for cooperative communications (DSFBC-CO-OFDM). At PHY layer, space ... -
Secure Performance of DF Relaying in Cooperative NOMA over Rician Fading Channels
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)In this paper, a Decode-and-Forward (DF) relaying system for Non Orthogonal Multiple Access (NOMA) networks is considered, where the transmitted information between the relay and NOMA users can be overheard by an eavesdropper. ...