بحث بسيط
السجلات المعروضة 1 -- 9 من 9
A Secrecy Study of UAV Based Networks with Fountain Codes and FD Jamming
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Securing wireless communication using different techniques has been an interesting topic for research, especially with the increasing demand on fast and secure transmission. In this research, we conduct a performance ...
Joint hierarchical modulation and network coding for two way relay networks
(
IEEE
, 2012 , Conference Paper)
The performance of a joint Hierarchical Modulation (HM) and Network Coding (NC) scheme for two way relay networks is introduced and evaluated in this paper. The proposed scheme uses selective relaying based on a signal-to-noise ...
On relay assignment in network-coded cooperative systems
(
IEEE
, 2011 , Article)
We consider in this paper relay assignment for cooperative systems with multiple two-way relay channels. The nodes corresponding to one two-way relay channel (henceforth referred to as pair) communicate with each other ...
Two way opportunistic MAC protocol for Ad Hoc networks
(
IEEE
, 2011 , Conference Paper)
In this paper, network coding is introduced in relay based MAC protocols for bidirectional traffic to evaluate the performance in terms of throughput and energy. The idea of proposed scheme is to use high data rate nodes ...
Adaptive network coding for spectrum sharing systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, we propose an adaptive network coding scheme for cognitive relay networks comprising multiple secondary sources communicating with a common destination in the presence of multiple primary users. Conventional ...
Relay assignment in network-coded cooperative systems with M-PSK modulation over asymmetric channels
(
IEEE
, 2010 , Conference Paper)
We consider in this paper relay assignment for cooperative systems with multiple two-way relay channels. The nodes corresponding to one two-way relay channel (henceforth referred to as pair) communicate with each other ...
Performance of two way opportunistic MAC protocol in non-saturated ad hoc networks
(
IEEE
, 2012 , Conference Paper)
In this paper, performance of relay based MAC protocol for two way traffic is evaluated in non-saturated condition. In real life, non-saturation is more prevalent where nodes are mostly idle. The idea of Two Way ...
Joint optimal threshold-based relaying and ml detection in network-coded two-way relay channels
(
Institute of Electrical and Electronics Engineers Inc.
, 2012 , Article)
In this paper, we address the problem of joint optimal threshold-based relaying and maximum likelihood (ML) detection in network-coded cooperative systems. The purpose of using threshold-based relaying is to circumvent the ...
On hierarchical network coding versus opportunistic user selection for two-way relay channels with asymmetric data rates
(
IEEE
, 2013 , Article)
We address in this paper the challenge of coping with asymmetric data rates in two-way relay channels. We consider a relay network comprising two sources and one relay. The sources communicate at different rates through ...