Results 41 to 50 of about 52,732 (293)

A Path Loss and Shadowing Model for Multilink Vehicle-to-Vehicle Channels in Urban Intersections

open access: yesSensors, 2018
The non line-of-sight (NLOS) scenario in urban intersections is critical in terms of traffic safety—a scenario where Vehicle-to-Vehicle (V2V) communication really can make a difference by enabling communication and detection of vehicles around ...
Mikael G. Nilsson   +3 more
doaj   +1 more source

Slow and fast adaptive modulation and coding for uplink massive MIMO systems with packet retransmission

open access: yesIET Communications, 2022
Here, the authors consider the uplink of a cellular massive multiple‐input multiple‐output (MIMO) system with maximum ratio combiner (MRC) at base stations (BSs).
Amin Radbord, Jalil S. Harsini
doaj   +1 more source

Opportunistic Relay Selection with Cooperative Macro Diversity

open access: yesEURASIP Journal on Wireless Communications and Networking, 2010
We apply a fully opportunistic relay selection scheme to study cooperative diversity in a semianalytical manner. In our framework, idle Mobile Stations (MSs) are capable of being used as Relay Stations (RSs) and no relaying is required if the direct path
Chia-Hao Yu   +2 more
doaj   +2 more sources

An Elevation-Aware Large-Scale Channel Model for UAV Air-to-Ground Links

open access: yesMathematics
This paper addresses the issue of existing research that fails adequately capture the spatiotemporal nonstationarity caused by the building of occlusion and flight dynamics in air-to-ground channels from unmanned aerial vehicles (UAVs) in urban scenarios.
Naier Xia, Yang Liu, Yu Yu
doaj   +1 more source

Energy Optimization Algorithm in WSN Based on Shadow Fading Channel Modeling [PDF]

open access: yesJisuanji gongcheng, 2016
To improve the energy efficiency of Wireless Sensor Network(WSN),an energy utility optimization algorithm based on random probability statistics model analysis is proposed in this paper.The algorithm based on Gamma and the modified Bessel function ...
ZHANG Fei,GENG Hongqin
doaj   +1 more source

Control and data channel resource allocation in OFDMA heterogeneous networks [PDF]

open access: yes, 2015
This paper investigates the downlink resource allocation problem in Orthogonal Frequency Division Multiple Access (OFDMA) Heterogeneous Networks (HetNets) consisting of macro cells and small cells sharing the same frequency band.
Dianati, Mehrdad   +3 more
core   +2 more sources

On the Statistics of Cognitive Radio Capacity in Shadowing and Fast Fading Environments (Journal Version)

open access: yes, 2009
In this paper we consider the capacity of the cognitive radio channel in different fading environments under a low interference regime. First we derive the probability that the low interference regime holds under shadow fading as well as Rayleigh and ...
Hanif, Muhammad Fainan, Smith, Peter J.
core   +1 more source

Wireless routeing scheme for UAV-assisted access networks based on the link path loss

open access: yesJournal of Information and Telecommunication
In this work, a group of unmanned aerial vehicles (UAVs) is aimed to function as relay nodes that provide a multi-hop wireless link between ground users.
Beza Negash Getu, Ali Alnoman
doaj   +1 more source

Wireless Link Capacity under Shadowing and Fading [PDF]

open access: yesProceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017
We consider the following basic link capacity (a.k.a., one-shot scheduling) problem in wireless networks: Given a set of communication links, find a maximum subset of links that can successfully transmit simultaneously. Good performance guarantees are known only for deterministic models, such as the physical model with geometric (log-distance) pathloss.
Halldorsson, Magnus M., Tonoyan, Tigran
openaire   +2 more sources

Secrecy Performance of α−κ−μ Shadowed Fading Channel [PDF]

open access: yes, 2021
En este documento, los aspectos de seguridad de la capa física de un marco inalámbrico sobre el canal de desvanecimiento en sombra α − κ − μ (AKMS) se examinan mediante la adquisición de expresiones novedosas de forma cerrada de capacidad de secreto promedio, probabilidad de interrupción segura (SOP) y capacidad de secreto estrictamente positiva.
A. S. M. Badrudduza   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy