Distributed power control for multiuser cognitive radio networks with quality of service and interference temperature constraints
One of the most challenging problems in dynamic resource allocation for cognitive radio networks is to adjust transmission power of secondary users SUs while quality of service needs of both SUs and primary users PUs are guaranteed. Most power control ...
A measurement-based study of handover improvement through range expansion and interference coordination
Although the range expansion and inter-cell interference coordination ICIC have been shown to successfully enhance the capacity and load balancing in the Heterogeneous Network, their impacts on the handover HO performance are not fully understood in ...
Monitoring power transmission lines using a wireless sensor network
Power transmission is the bulk transfer of electrical energy from power plants to sub-stations. A wireless sensor network is a promising technology for transmission line monitoring due to its low cost, easy installation, large-scale coverage, and fault ...
EM channel characteristics and their impact on MAC layer performance in underwater surveillance networks
Wireless communications and multihop networking based on electromagnetic EM radios have been considered as an alternative to acoustic communications in seawater because in typical applications for networked underwater sensing, EM waves are much less ...
Opportunistic interference management: a new approach for multiantenna downlink cellular networks
- Mohsen Karimzadeh Kiskani,
- Zheng Wang,
- Hamid R. Sadjadpour,
- Jose A. Oviedo,
- Jose Joaquin Garcia-Luna-Aceves
A new approach for multiantenna broadcast channels in cellular networks based on multiuser diversity concept is introduced. The technique called opportunistic interference management achieves dirty paper coding capacity asymptotically with minimum ...
Real traffic logs creation for testing intrusion detection systems
Port scanning is one of the most popular reconnaissance techniques that many attackers use to profile running services on a potential target before launching an attack. Many port scanning detection mechanisms have been suggested in literature. To test ...