Search
نمایش تعداد 1-10 از 66
Outage Analysis of Relay Selection Methods for IEEE802.16j
: The IEEE 802.16e standard serves as the backhaul of broadband wireless access in the emerging fourth-generation mobile networks. Deploying relay stations as defined in IEEE 802.16j enhances the coverage area and throughput ...
A Novel Method for Singular Value Decomposition of Polynomial Matrices and ICI Cancellation in a Frequency-Selective MIMO Channel
In this paper, we introduce two novel methods to cancel ICI in frequency-selective MIMO
channels, which suffer from inter-channel interference (ICI) and inter-symbol interference (ISI).
Both of these two ...
An application of Chen system for secure chaotic communication based on extended Kalman filter and multi-shift cipher algorithm
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. In this
paper a chaotic communication method using extended Kalman filter is presented. The chaotic ...
Cooperative beamforming and relay selection in cognitive radio systems
In this paper, a new scheme is suggested for cooperative beamforming (BF) and relay selection in CR
networks, where a pair of secondary users communicates with each other assisted by some multiple antenna relay ...
Cooperative Beamforming in Relay Assisted MIMO-OFDMA Cognitive Radio Systems
In this paper, a new algorithm is proposed for cooperative beamforming, power allocation and relay
selection in the multiple input multiple output (MIMO) Orthogonal Frequency Division Multiple Access (OFDMA) CR ...
A 24-channel implantable neural recording based on time and frequency-division multiplexing
TDM module is the fundamental advantage of this method that leads to reduced crosstalk noise. We evaluate some possible configurations and propose an optimized system that has less power dissipation and area occupation ...
Gaussian Z Channel with Intersymbol Interference
In this paper, we derive a capacity inner bound for a synchronous Gaussian Z channel with intersymbol interference (ISI) under input power constraints. This is done by converting the original channel model into an n-block ...
Z-interference channel with side information at the transmitters
In this paper, channel coding strategies for the problem of communication over a two-user Z-interference channel (ZIC) in the presence of non-causal side information (NSI) at transmitters are presented. First, an achievable ...
A novel secure and energy-efficient protocol for authentication in wireless sensor networks
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Efficiency of WSN depends on the correctness of ...