Search
Now showing items 21-30 of 30
Performance analysis of relay selection schemes in underlay cognitive networks with imperfect channel state information
(
IEEE Computer Society
, 2013 , Conference Paper)
Cognitive Radio (CR) aims to improve spectrum utilization by allowing unlicensed users to access the licensed spectrum and to coexist with primary user (PU) while respecting the PU's restrictions. An interesting case to ...
Secrecy Performance Analysis of Multi-Antenna NOMA System with AF/DF relaying under External and Internal Eavesdropping Scenarios
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOMA) users have the capability of decoding the other paired users sharing the same resource bloc. As a result, NOMA technique ...
A Secrecy Study of UAV Based Networks with Fountain Codes and FD Jamming
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Securing wireless communication using different techniques has been an interesting topic for research, especially with the increasing demand on fast and secure transmission. In this research, we conduct a performance ...
Area spectral efficiency of underlay cognitive radio transmission over rayleigh fading channels
(
IEEE
, 2013 , Conference Paper)
Cognitive radio is a promising technology to improve the spectrum utilization by allowing the unlicensed (secondary) user share a frequency bandwidth with the licensed (primary) owner under the condition that no harmful ...
Performance analysis of selective cooperation with fixed gain relays in Nakagami-m channels
(
elsevier B.V.
, 2012 , Article)
Selecting the best relay using the maximum signal to noise ratio (SNR) among all the relays ready to cooperate saves system resources and utilizes the available bandwidth more efficiently compared to the regular all-relay ...
Secure Performance Analysis for Full-Duplex Cooperative NOMA System in the Presence of Multiple Eavesdroppers
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
This paper investigates the physical layer security of a full-duplex (FD) Decode-and-Forward (DF) NOMA network assumed to undergo independent and identically distributed Nakagami-m fading. Herein, we provide a secrecy ...
Exact capture probability analysis of GSC receivers over Rayleigh fading channel
(
IEEE
, 2010 , Conference Paper)
For third generation systems and ultrawideband systems, RAKE receivers have been introduced due to the advantage of RAKE receivers which is their ability to combine different replicas of the transmitted signal arriving at ...
Performances analysis of SEC based transmit diversity systems with MRC receivers
(
IEEE
, 2012 , Conference Paper)
Switch and Examine combining (SEC) diversity scheme is one of the simplest yet efficient diversity schemes. Earlier in [1] and [2], we proposed sequential power loading algorithm to reduce the average power used at the ...
Capacity enhancement in cognitive radio wireless network with dynamic spectrum access
(
IEEE Computer Society
, 2014 , Conference Paper)
Deployment of femto-cells underlaying the macro-cell has been proven to greatly improve the system capacity and the indoor coverage. However, to successfully deploy this heterogeneous network, the interference among the ...
Performance Analysis of Index Modulation Based Multiple Access under Imperfect Channel Estimation
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Future generations of wireless communication systems are expected to serve a large number of users with different quality of service requirements. Given the limited spectrum resources, the current multiple access schemes ...