Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 15, Issue 14October 2015
Reflects downloads up to 22 Nov 2024Bibliometrics
Skip Table Of Content Section
article
Issue Information
article
Distributed power control for multiuser cognitive radio networks with quality of service and interference temperature constraints

One of the most challenging problems in dynamic resource allocation for cognitive radio networks is to adjust transmission power of secondary users SUs while quality of service needs of both SUs and primary users PUs are guaranteed. Most power control ...

article
A measurement-based study of handover improvement through range expansion and interference coordination

Although the range expansion and inter-cell interference coordination ICIC have been shown to successfully enhance the capacity and load balancing in the Heterogeneous Network, their impacts on the handover HO performance are not fully understood in ...

article
Monitoring power transmission lines using a wireless sensor network

Power transmission is the bulk transfer of electrical energy from power plants to sub-stations. A wireless sensor network is a promising technology for transmission line monitoring due to its low cost, easy installation, large-scale coverage, and fault ...

article
EM channel characteristics and their impact on MAC layer performance in underwater surveillance networks

Wireless communications and multihop networking based on electromagnetic EM radios have been considered as an alternative to acoustic communications in seawater because in typical applications for networked underwater sensing, EM waves are much less ...

article
Opportunistic interference management: a new approach for multiantenna downlink cellular networks

A new approach for multiantenna broadcast channels in cellular networks based on multiuser diversity concept is introduced. The technique called opportunistic interference management achieves dirty paper coding capacity asymptotically with minimum ...

article
Real traffic logs creation for testing intrusion detection systems

Port scanning is one of the most popular reconnaissance techniques that many attackers use to profile running services on a potential target before launching an attack. Many port scanning detection mechanisms have been suggested in literature. To test ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.