Results 51 to 60 of about 22,554 (188)

DRL‐Based Joint Clustering and Trajectory Optimization for UAV‐Assisted Emergency Networks

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
6G is expected to see unprecedented data traffic surges. UAV‐assisted MEC aids emergency communications but faces challenges from dynamic user mobility and heterogeneous tasks. To address these, the proposed KM‐PPO integrates interference‐aware k‐means clustering (for user aggregation and initial UAV deployment) and PPO (for stable policy updates and ...
Ruirui Xu   +4 more
wiley   +1 more source

Cooperative Interference Control for Spectrum Sharing in OFDMA Cellular Systems

open access: yes, 2011
This paper studies cooperative schemes for the inter-cell interference control in orthogonal-frequency-divisionmultiple- access (OFDMA) cellular systems.
Da, Bin, Zhang, Rui
core   +1 more source

Joint Decision‐Making for UAV Deployment and Computational Offloading Optimized for Energy Consumption and Latency in Space‐Air‐Ground Integrated Networks

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
Within the framework of integrated space‐air‐ground edge computing networks, this paper investigates the joint optimization of task allocation, user‐UAV association, UAV deployment, and computation resource allocation between UAVs and the LEO satellite.
Tengda Huang, Tao Hu, Di Wu, Wenzhi Zhao
wiley   +1 more source

Resource Allocation for Outdoor-to-Indoor Multicarrier Transmission with Shared UE-side Distributed Antenna Systems

open access: yes, 2015
In this paper, we study the resource allocation algorithm design for downlink multicarrier transmission with a shared user equipment (UE)-side distributed antenna system (SUDAS) which utilizes both licensed and unlicensed frequency bands for improving ...
Breiling, Marco   +4 more
core   +1 more source

Communication‐Security Co‐Design for Federated Learning in Grant‐Free NOMA IoT Networks

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This article presents SA‐PPO, a Security‐Aware Proximal Policy Optimisation framework for federated learning over grant‐free NOMA (non‐orthogonal multiple access) in IoT networks. By jointly optimising access control, resource allocation, and trust‐weighted aggregation using cross‐layer indicators, SA‐PPO enhances both communication reliability and ...
Emmanuel Atebawone   +5 more
wiley   +1 more source

OFDMA-Based Medium Access Control for Next-Generation WLANs

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
Existing medium access control (MAC) schemes for wireless local area networks (WLANs) have been shown to lack scalability in crowded networks and can suffer from widely varying delays rendering them unsuited to delay sensitive applications, such as voice
H. M. Alnuweiri   +3 more
doaj   +2 more sources

Spectral Efficiency Comparison of OFDM and MC-CDMA with Carrier Frequency Offset [PDF]

open access: yesRadioengineering, 2017
Inter-carrier interference and multiple access interference due to carrier frequency offset (CFO) are two major factors that deteriorate the performance of orthogonal frequency division multiple access (OFDMA) and multicarrier code division multiple ...
J. Ahmed
doaj  

Performance Analysis of QoS-Oriented OFDMA Protocol Based on IEEE 802.11ax for Cognitive Radio Network

open access: yesApplied Sciences, 2023
To improve the quality of service (QoS) on the internet of medical things, a cognitive radio (CR) protocol based on orthogonal frequency division multiple access (OFDMA) is proposed, named CR-OFDMA.
Suoping Li   +4 more
doaj   +1 more source

MAC Protocol Design for Optical Wireless Body‐Area Networks: Latency, Energy Efficiency and Scalability Analysis

open access: yesIET Networks, Volume 15, Issue 1, January/December 2026.
This work investigates suitable MAC protocols for medical optical wireless body‐area networks (WBANs), focussing on multiple access management. Using realistic channel models, we evaluate the network performance in terms of energy efficiency, quality‐of‐service and scalability for different IEEE protocols, for both intra‐ and extra‐WBAN connectivity in
Christos Giachoudis   +5 more
wiley   +1 more source

Secure image transmission through LTE wireless communications systems

open access: yesEURASIP Journal on Image and Video Processing
Secure transmission of images over wireless communications systems can be done using RSA, the most known and efficient cryptographic algorithm, and OFDMA, the most preferred signal processing choice in wireless communications.
Farouk Abduh Kamil Al-Fahaidy   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy