SN Donthi, NB Mehta - IEEE Transactions on Vehicular …, 2011 - ieeexplore.ieee.org
Frequency-domain scheduling and rate adaptation enable next-generation orthogonal frequency-division multiple access (OFDMA) cellular systems such as Long-Term Evolution …
D Parruca, J Gross - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
Various system tasks, such as interference coordination, handover decisions, admission control, and so on in current cellular networks require precise mid-term (spanning over a few …
One of the most efficient techniques that is inevitable for the state of the art communication system in today's wireless communication is multiple-input multiple-output (MIMO) …
S Guharoy, NB Mehta - IEEE Transactions on Vehicular …, 2012 - ieeexplore.ieee.org
Orthogonal frequency-division multiple access (OFDMA) systems divide the available bandwidth into orthogonal subchannels and exploit multiuser diversity and frequency …
JK Daksh, R Mohan, S Sharma - International Journal of Advanced …, 2013 - Citeseer
In this paper we show the performance analysis from the previous research and find the drawbacks for the further enhancement. We are considering the case of multiple antennas …
JK Daksh, R Mohan, S Sharma - International Journal of Advanced …, 2013 - Citeseer
This paper is devoted to space-time coding for multiple-input/multiple-output (MIMO) systems. The concept of space-time coding is explained in a systematic way. The …
MI Salman, MQ Abdulhasan, CK Ng, NK Noordin… - Computer Networks, 2017 - Elsevier
Opportunistic frequency-domain scheduling and link adaptation enable the long term evolution (LTE) cellular systems to maximize the throughput. Successful scheduling and link …
A Baghaei Pouri, M Torabi - IET Communications, 2020 - Wiley Online Library
In this study, the physical layer (PHY) security performance of orthogonal space‐time block coding (OSTBC) employing a coordinate interleaved orthogonal design (CIOD) is analysed …
M Torabi, D Haccoun - IET Communications, 2020 - Wiley Online Library
This study presents an analysis for evaluating the physical layer (PHY) security performance of a two‐hop amplify‐and‐forward cooperative relaying system employing Alamouti …