Search
Now showing items 11-20 of 26
Optimizing cloud-service performance: Efficient resource provisioning via optimal workload allocation
(
IEEE Computer Society
, 2017 , Article)
Cloud computing is being widely accepted and utilized in the business world. From the perspective of businesses utilizing the cloud, it is critical to meet their customers' requirements by achieving service-level-objectives. ...
Power loading algorithms for SEC diversity schemes
(
IEEE
, 2007 , Conference Paper)
Switch and Examine Combing (SEC) diversity scheme is one of the simplest diversity schemes to combat fading. When the power used for probing the channels in this scheme is fixed, it can be higher than what is actually ...
Cognitive relaying in wireless sensor networks: Performance analysis and optimization
(
IEEE
, 2010 , Conference Paper)
The anticipated increase in the density of the deployed wireless sensor networks calls for spectrum sharing through unlicensed access to licensed spectrum. The key technology for spectrum sharing in this scenario is cognitive ...
Performance analysis of best relay selection scheme for amplify-and-forward cooperative networks in identical Nakagami-m channels
(
IEEE
, 2010 , Conference Paper)
In cooperative communication networks, the use of multiple relays between the source and the destination was proposed to increase the diversity gain. Since the source and all the relays must transmit on orthogonal channels, ...
Performance analysis of selective cooperation in underlay cognitive networks over Rayleigh channels
(
IEEE
, 2011 , Conference Paper)
Underlay cognitive networks should follow strict interference thresholds to operate in parallel with primary networks. This constraint limits their transmission power and eventually the area of coverage. Therefore, it is ...
Performance analysis of relay selection schemes in underlay cognitive networks with Decode and Forward relaying
(
IEEE
, 2012 , Conference Paper)
In underlay cognitive networks with regenerative relaying, secondary users operating with primary user are adhering to stringent interference constraint which limits their transmission power and coverage area. In order not ...
Performance analysis of relay selection schemes in underlay cognitive networks with imperfect channel state information
(
IEEE Computer Society
, 2013 , Conference Paper)
Cognitive Radio (CR) aims to improve spectrum utilization by allowing unlicensed users to access the licensed spectrum and to coexist with primary user (PU) while respecting the PU's restrictions. An interesting case to ...
Secrecy Performance Analysis of Multi-Antenna NOMA System with AF/DF relaying under External and Internal Eavesdropping Scenarios
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOMA) users have the capability of decoding the other paired users sharing the same resource bloc. As a result, NOMA technique ...
A Secrecy Study of UAV Based Networks with Fountain Codes and FD Jamming
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Securing wireless communication using different techniques has been an interesting topic for research, especially with the increasing demand on fast and secure transmission. In this research, we conduct a performance ...
Area spectral efficiency of underlay cognitive radio transmission over rayleigh fading channels
(
IEEE
, 2013 , Conference Paper)
Cognitive radio is a promising technology to improve the spectrum utilization by allowing the unlicensed (secondary) user share a frequency bandwidth with the licensed (primary) owner under the condition that no harmful ...