The recent increase in distributed generators due to the benefits they bring, such as a decrease in CO2 emissions, deforestation, increase in energy efficiency, and creation of employment opportunities for locals, wit...
详细信息
In this paper, a visible light communication (VLC) cellular network that utilizes non-orthogonal multiple access (NOMA) is investigated. To deal with the high inter-cell interference attributed to the high-density of ...
详细信息
ISBN:
(数字)9781665410441
ISBN:
(纸本)9781665410441
In this paper, a visible light communication (VLC) cellular network that utilizes non-orthogonal multiple access (NOMA) is investigated. To deal with the high inter-cell interference attributed to the high-density of VLC network nodes, a medium access control (MAC) scheduler is designed based on a distributed NOMA approach that aims at increasing the performance of cell-edge users, while securing the high data rate requirements of cell-center users in the VLC network. To this end, two practical protocols are proposed to guarantee the increased spectral efficiency and interference mitigation through distributed NOMA. In each protocol, the decoding strategy and power allocation of the users is investigated through a low complexity algorithm that ensures user fairness in the network. The presented analysis is validated through simulations, where the proposed schemes notably outperform the benchmark scheme in which the cell-edge user does not perform successive interference cancellation. Finally, the results showcase valuable insights, mainly on the fact that the decoding strategy in such networks is not as obvious as in conventional downlink NOMA.
The existence of so-called adversarial examples has become a serious threat to Deep Neural networks (DNN) and their applications, especially security-sensitive ones. Explanations and defenses mainly focused on inside ...
详细信息
With the increasing integration of renewable energy into the power grid, the demand for efficient communication systems for managing and controlling distributed power sources has become urgent. Here, we introduce the ...
详细信息
Speaker recognition, also known as speaker identification, encompasses two major functions: speaker identification and speaker verification. It is a critical branch of speech processing. The aim of this technology is ...
详细信息
This paper addresses the challenge of reducing annotation costs in distributed learning environments, particularly in systems with limited data and computational resources, such as those found in edge devices. We prop...
详细信息
The presence of numerous bidirectional communication devices connecting customers to the grid makes smart grid networks particularly vulnerable to network attacks. As an instance of a network attack that could impact ...
详细信息
The convergence of vehicular networks and the Meta-verse, referred to as the Vehicular Edge Metaverse is set to revolutionize both transportation and in-car experiences. This paradigm shift envisions vehicles not only...
详细信息
Satellite-Terrestrial Integrated networks (STINs) integrate satellite networks, the Internet, and mobile wireless networks and are able to provide powerful services to users. In STIN, satellite gateways play an import...
详细信息
Wireless personal sensor networks (WPSNs) are an emerging technology that provides a platform for monitoring and collecting data from a variety of sources. These networks are used to monitor environmental, health, and...
详细信息
暂无评论