Search
Now showing items 71-80 of 100
Effect of high-velocity scenarios on the performance of MIMO LTE packet scheduling
(
IEEE
, 2011 , Conference Paper)
In this paper we analyze the performance of advanced OFDM packet scheduling techniques based on 3GPP UTRAN Long Term Evolution (LTE) framework for high velocity scenarios. Based on our previous investigations in system ...
Secrecy Performance of Full-Duplex Jamming and Reception under I/Q Imbalance
(
IEEE
, 2021 , Article)
Investigating the physical layer security performance of full-duplex (FD) radio transceivers has been the subject of numerous research studies. However, self-interference cancellation that enables full exploitation of FD ...
Cooperative access schemes for efficient SWIPT transmissions in cognitive radio networks
(
IEEE
, 2015 , Conference Paper)
We investigate joint information and energy cooperative schemes in a slotted-time cognitive radio network with a primary transmitter-receiver pair and a set of secondary transmitter-receiver pairs. The primary transmitter ...
Exploiting sparsity of relay-assisted cognitive radio networks
(
IEEE
, 2015 , Conference Paper)
We propose a novel protocol for secondary users based on compressive sensing principles. The secondary user assigned to one of the primary frequency bands is aided by a set of nearby secondary users, which we refer to as ...
Cooperative Machine Learning Techniques for Cloud Intrusion Detection
(
IEEE
, 2021 , Conference Paper)
Cloud computing is attracting a lot of attention in the past few years. Although, even with its wide acceptance, cloud security is still one of the most essential concerns of cloud computing. Many systems have been proposed ...
Data Augmentation for Intrusion Detection and Classification in Cloud Networks
(
IEEE
, 2021 , Conference Paper)
Cloud computing is a paradigm that provides multiple services over the internet with high flexibility in a cost-effective way. However, the growth of cloud-based services comes with major security issues. Recently, machine ...
Decentralized multiuser diversity with opportunistic packet transmission in MIMO wireless sensor networks
(
Elsevier
, 2013 , Article)
In this study, we consider a single-hop wireless sensor network where both the sensor nodes and the controller node have multiple antennas. We focus on single beam opportunistic communication and propose a threshold-based ...
Joint learning and optimization for Federated Learning in NOMA-based networks
(
Elsevier
, 2023 , Article)
Over the past decade, the usage of machine learning (ML) techniques have increased substantially in different applications. Federated Learning (FL) refers to collaborative techniques that avoid the exchange of raw data ...
Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveillance
(
IEEE
, 2023 , Article)
Advances in communication technologies and computational capabilities of Internet of Things (IoT) devices enable a range of complex applications that require ever increasing processing of sensors' data. An illustrative ...
A threshold-based opportunistic MAC protocol for MIMO wireless sensor networks
(
IEEE
, 2012 , Conference Paper)
In this paper, we consider a single-hop wireless sensor network where both the sensor nodes and the controller node have multiple antennas. We focus on single beam opportunistic communication and propose a threshold-based ...