Public versus private cloud adoption—A case study based on open source cloud platforms

G Suciu, EG Ularu… - 2012 20th …, 2012 - ieeexplore.ieee.org
The traditional way of IT in a company can be very problematic. As changes in the business
environment occur, so appears the need to implement more efficient enterprise systems …

A new password-based multi-server authentication scheme robust to password guessing attacks

JL Tsai, NW Lo, TC Wu - Wireless personal communications, 2013 - Springer
A multi-server authentication scheme is a useful authentication mechanism in which a
remote user can access the services of multiple servers after registering with the registration …

The application of a channel-individualized method for assessing long-term, realistic exposure to radiofrequency radiation emitted by mobile communication base …

S Miclaus, P Bechet, C Iftode - Measurement, 2013 - Elsevier
Human exposure to radiofrequency signals emitted by Global System for Mobile
communications (GSM) base station antennas is still of interest from health and …

Unitary subspace-based method for angle estimation in bistatic MIMO radar

J Li, X Zhang - Circuits, Systems, and Signal Processing, 2014 - Springer
In this paper, the issue of joint angle estimation for bistatic multiple-input multiple-output
(MIMO) radar is investigated, and an algorithm for the joint estimation under real-valued …

Implication of LDPC technique in non-ideal multiuser communication system

I Marcu, SV Halunga - Wireless Personal Communications, 2016 - Springer
The present paper analyzes the effect of LDPC coding on the performances of a CDMA DS-
SS multiuser system. Two types of detectors are analyzed, namely the conventional matched …

Guard Interval effects on OFDM/BPSK transmissions over fading channels

R Craciunescu, S Halunga… - 2012 20th …, 2012 - ieeexplore.ieee.org
This paper presents the performances BPSK/OFDM systems in terms of Bit Error Rate (BER)
as a function of Signal to Noise Ratio (SNR) using different types and lengths of Guard …

Performances of conventional and MMSE detectors for image transmissions

C Voicu, S Halunga, D Vizireanu - 2011 10th International …, 2011 - ieeexplore.ieee.org
This paper presents the results obtained by using conventional and MMSE (minimum mean
square error) multiuser detectors structures when gray images are transmitted through the …

A multi-carrier scheduling algorithm for LTE-advanced

A Vulpe, O Fratu, A Mihovska… - 2013 16th International …, 2013 - ieeexplore.ieee.org
LTE-Advanced aims to provide a transmission bandwidth of 100 MHz by using Carrier
Aggregation to aggregate LTE Rel. 8 carriers. In order to increase the system capacity …

QoS-aware downlink scheduling in multi-carrier communication systems

A Vulpe, S Halunga, O Fratu - 2014 4th International …, 2014 - ieeexplore.ieee.org
In order to increase the system capacity in next generation wireless networks, defining new
packet scheduling and resource allocation algorithms can be an approach. In the context of …

Fuzzy step size least mean square algorithm tuned linearly constrained constant modulus algorithm for multi‐carrier code division multiple access blind multiuser …

HL Hung, CH Cheng - International Journal of Communication …, 2014 - Wiley Online Library
Adaptive fuzzy logic step size least mean square algorithm (FLCLMS) tuning unit is
designed to adjust the step size of the linear constrained constant modulus algorithm for …