Search
Now showing items 11-17 of 17
Energy efficient mobile relay selection for two-hop wireless networks
(
IEEE Computer Society
, 2014 , Conference Paper)
In this paper, we propose a relay selection strategy for randomly distributed multiple relays. A single relay is selected for transmitting signal from a fixed source to a fixed destination which requires minimum total ...
On the joint scheduling and intra-cell interference coordination in multi-relay LTE uplink
(
IEEE
, 2012 , Conference Paper)
The relay-assisted Long Term Evaluation (LTE) cellular system is one of the most promising technologies to enhance the throughput and coverage of the access network. Injection of relays in a cell opens many issues of ...
Low Complexity Constellation Rotation-based SIC Detection for IM-NOMA Schemes
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the expected explosive growth in the user density in wireless networks, recent works have investigated the integration of index modulation (IM) with multiple access schemes, namely the non-orthogonal multiple access ...
Face segmentation in thumbnail images by data-adaptive convolutional segmentation networks
(
IEEE Computer Society
, 2016 , Conference Paper)
In this study we address the problem of face segmentation in thumbnail images. While there have been several approaches for face detection, none performs detection in such low resolution and segmentation with pixel accuracy. ...
Cloud of things for sensing as a service: sensing resource discovery and virtualization
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
We propose Cloud of Things for Sensing as a Service: a global architecture that scales up cloud computing by exploiting the global sensing resources of the highly dynamic and growing Internet of Things (IoT) to enable ...
Social interaction increases capacity of wireless networks
(2013 , Conference Paper)
A network model with both social and communication characteristics is considered. Different capacity regions are computed as a function of the social network size for each node. It has been shown that as the social ...
IoT Anti-Jamming Strategy Using Game Theory and Neural Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and ...