تصفح Electrical Engineering حسب العنوان
السجلات المعروضة 1371 -- 1390 من 2495
-
Iterative compressive estimation and decoding for network-channel-coded two-way relay sparse ISI channels
( IEEE , 2012 , Article)We propose an iterative compressive channel estimation and decoding scheme for network-channel-coded two-way relay sparse intersymbol interference channels. The underlying system model comprises two source nodes and one ... -
Joint coding for proactive caching with changing file popularities
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Proactive caching is a promising technique used to minimize peak traffic rates by storing popular data, in advance, at different nodes in the network. We study a cellular network with one base station (BS) communicating ... -
Joint Frame Synchronization and Channel Estimation: Sparse Recovery Approach and USRP Implementation
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Correlation-based techniques used for frame synchronization can suffer significant performance degradation over multi-path frequency-selective channels. In this paper, we propose a joint frame synchronization and channel ... -
Joint hierarchical modulation and network coding for two way relay networks
( IEEE , 2012 , Conference Paper)The performance of a joint Hierarchical Modulation (HM) and Network Coding (NC) scheme for two way relay networks is introduced and evaluated in this paper. The proposed scheme uses selective relaying based on a signal-to-noise ... -
Joint interference cancellation and dirty paper coding for cognitive cellular networks
(2011 , Conference Paper)Downlink communication in a cellular network with a cognitive (secondary) cell is considered. In our model, the base station of the cognitive cell knows the messages of the other cell non-causally. We propose a new ... -
Joint K-Means quantization for Approximate Nearest Neighbor Search
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Recently, Approximate Nearest Neighbor (ANN) Search has become a very popular approach for similarity search on large-scale datasets. In this paper, we propose a novel vector quantization method for ANN, which introduces ... -
Joint learning and optimization for Federated Learning in NOMA-based networks
( Elsevier , 2023 , Article)Over the past decade, the usage of machine learning (ML) techniques have increased substantially in different applications. Federated Learning (FL) refers to collaborative techniques that avoid the exchange of raw data ... -
Joint optimal threshold-based relaying and ML detection in cooperative networks
( IEEE , 2012 , Article)This paper proposes two detection schemes for cooperative networks comprising a source, a relay and a destination. The relay is assumed to operate in a half-duplex mode and it employs decode-and-forward (DF) relaying. The ... -
Joint optimal threshold-based relaying and ml detection in network-coded two-way relay channels
( Institute of Electrical and Electronics Engineers Inc. , 2012 , Article)In this paper, we address the problem of joint optimal threshold-based relaying and maximum likelihood (ML) detection in network-coded cooperative systems. The purpose of using threshold-based relaying is to circumvent the ... -
Joint Optimization of Area Spectral Efficiency and Delay over PPP Interfered Ad-Hoc Networks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)To evaluate the performance of the co-channel transmission based communication, we propose a new metric for area spectral efficiency (ASE) of interference limited ad-hoc network by assuming that the nodes are randomly ... -
Joint optimization of throughput and delay over PPP interfered relay networks
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Future wireless networks are expected to achieve higher data rates and ubiquitous coverage by seamless cooperation among diverse network technologies. However, it also increases the risk of co-channel interference and ... -
Joint resource scheduling and peak power shaving for cloud data centers with distributed Uninterruptible power Supply
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)The grid company enforces high penalties for the peak power demands of cloud data centers. These high penalties result in high electricity bill that can be avoided by relying on the servers' Uninterruptible Power Supply ... -
Joint secured and robust technique for OFDM systems
( IEEE , 2013 , Conference Paper)This work presents a novel technique for joint secured and robust transmission of orthogonal frequency division multiplexing (OFDM) based communication systems. The proposed system is implemented by developing a new OFDM ... -
Joint security and energy efficiency in iot networks through clustering and bit flipping
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Channel-aware encryption is investigated as a physical layer security technique in internet of things (IoT) scenarios. Clustering algorithms for grouping sensor nodes into cooperative clusters are proposed, with the purpose ... -
Joint statistics of partial sums of ordered exponential variates and performance of GSC RAKE receivers over rayleigh fading channel
( IEEE , 2011 , Article)Spread spectrum receivers with generalized selection combining (GSC) RAKE reception were proposed and have been studied as alternatives to the classical two fundamental schemes: maximal ratio combining and selection combining ... -
K-Subspaces Quantization for Approximate Nearest Neighbor Search
( IEEE Computer Society , 2016 , Article)Approximate Nearest Neighbor (ANN) search has become a popular approach for performing fast and efficient retrieval on very large-scale datasets in recent years, as the size and dimension of data grow continuously. In this ... -
Key is in the Air: Hacking Remote Keyless Entry Systems
( Springer Verlag , 2019 , Conference Paper)A Remote Keyless Systems (RKS) is an electronic lock that controls access to a building or vehicle without using a traditional mechanical key. Although RKS have become more and more robust over time, in this paper we show ... -
Knowledge Transfer for Face Verification Using Heterogeneous Generalized Operational Perceptrons
( IEEE Computer Society , 2019 , Conference Paper)Face verification is a prominent biometric technique for identity authentication that has been used extensively in several security applications. In practice, face verification is often performed along with other visual ... -
L-L and L-2L Multilevel boost converter topologies with voltage multiplier with L-L and L-2L converter of XY familiy
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)A New L-L and L-2L Multilevel Boost Converter topologies (L-LMBC and L-2LMBC) are proposed for photovoltaic (PV) energy application. Both L-LMBC and L-2LMBC topologies are designed to provide a viable and effective solution ... -
L-L Converter for Fuel Cell Vehicular Power Train Applications: Hardware Implementation of Primary Member of X-Y Converter Family
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)In this research work, L-L converter (primary member of XY converter family) is proposed and discussed in detail for fuel cell based Vehicular Power Train (FC VPT) and DC auxiliary loads. In normally, that the voltage of ...