scholarly journals On the achievable rates of a secondary link coexisting with a primary multiple access network

Author(s):  
John Tadrous ◽  
Mohammed Nafie
Author(s):  
Adnan Mahmood ◽  
Shadi M. S. Hilles ◽  
Hushairi Zen

Vertical Handover Decision (VHD) algorithms are indispensable components of forthcoming 4G heterogeneous wireless networks architecture – so as to provide requisite Quality of Service to an assortment of applications anywhere at any time, while allowing seamless roaming in highly dynamic scenarios (i.e. multitude of access network technologies that vary in bandwidth, latency, monetary cost, etc.) using Mobile Terminals (MTs) enabled with multiple access interfaces. In this article, a critical review of the existing VHD algorithms has been carried out as an effort to update the previous studies. To offer a methodical contrast, recently published VHD algorithms have been classified into four major classes depending on the key handover decision criterion used, i.e. RSS based algorithms, bandwidth based algorithms, cost function based algorithms, and the combination algorithms. Moreover, operational fundamentals, advantages, and disadvantages of exemplary VHD algorithms for each class have been presented to assess the tradeoffs between their intricacy of implementation and the efficacy.


1992 ◽  
Vol 11 (1) ◽  
pp. 1-24 ◽  
Author(s):  
Joséa Capmany ◽  
Joséa Enriquez ◽  
Miguel A. Muriel ◽  
David Selviah ◽  
John E. Midwinter

2021 ◽  
Vol 10 (2) ◽  
pp. 848-855
Author(s):  
Chi-Bao Le ◽  
Dinh-Thuan Do

This paper studies a downlink security-aware secure outage performance in the secondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the secondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expressions of Strictly positive secure capacity (SPSC) are proved to analyze system in terms of secure performance. Finally, the secondary user secure problem is evaluated via Monte-Carlo simulation method. The main results indicate that the secure performance of proposed system can be improved significantly.


Sign in / Sign up

Export Citation Format

Share Document