—In this paper, we evaluate the performance of a WiMAX network in different frequency reuse scenarios with and without adaptive beaforming technique. We study the possibility of ...
Masood Maqbool, Marceau Coupechoux, Philippe Godle...
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
—The technology based on the IEEE 802.11 standard has been hugely successful, and is evolving towards even higher speeds and richer features. In particular, the 802.11n amendment...
— In this paper, we evaluate the performance of adaptive algorithms for selecting the number of redundant packets by jointly considering the forward error correction (FEC) and au...
- As a primary technology for broadband wireless access (BWA), mobile WiMAX, recently has gained tremendous momentum in the industrial and academic sectors. However, due to signifi...
— This paper addresses advanced radio resource management (RRM) algorithms for multiple-input multipleoutput (MIMO) transmission schemes in downlink OFDMA systems. The analysis c...
—Metropolitan wireless mesh networks are being deployed to provide broadband connectivity to city-wide hotspots. However, its commercial feasibility and business model have not y...
— This study proposes an efficient way of interference mitigation for ultra-wideband energy detection. A receiver for pulse position modulation systems is investigated. The inter...
Sami Mekki, Jean-Luc Danger, Benoit Miscopein, Jea...
Abstract— Depending on the position of mobile stations in the multihop relay system, various types of cooperative relaying schemes show the different level of throughput and outa...
Abstract— In this contribution we design the Iteratively Decoded Self-Concatenated Convolutional Codes (SECCC-ID) using Extrinsic Information Transfer (EXIT) charts. Good constit...
Muhammad Fasih Uddin Butt, Soon Xin Ng, Lajos Hanz...