Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Performance analysis of single relay selection in Rayleigh fading
DS Michalopoulos… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
We provide closed-form expressions for the outage and bit error probability (BEP) of
uncoded, threshold-based opportunistic relaying (OR) and selection cooperation (SC), at …
uncoded, threshold-based opportunistic relaying (OR) and selection cooperation (SC), at …
Opportunistic access point selection for mobile edge computing networks
In this paper, we investigate a mobile edge computing (MEC) network with two
computational access points (CAPs), where the source is equipped with multiple antennas …
computational access points (CAPs), where the source is equipped with multiple antennas …
Reliability-aware joint optimization for cooperative vehicular communication and computing
This paper comprehensively discusses the cooperative communication and computation of
vehicular system. Based on the cooperative transmission, an stochastic model of vehicle-to …
vehicular system. Based on the cooperative transmission, an stochastic model of vehicle-to …
Opportunistic relay selection for secrecy enhancement in cooperative networks
FS Al-Qahtani, C Zhong… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we present a comprehensive investigation on the secrecy performance of
opportunistic relay selection systems employing the decode-and-forward protocol over …
opportunistic relay selection systems employing the decode-and-forward protocol over …
Hybrid lightwave/RF cooperative NOMA networks
We propose an indoor lightwave downlink wireless communication network with the non-
orthogonal multiple access (NOMA) technology, that consists of one visible light …
orthogonal multiple access (NOMA) technology, that consists of one visible light …
Secure switch-and-stay combining (SSSC) for cognitive relay networks
In this paper, we study a two-phase underlay cognitive relay network, where there exists an
eavesdropper who can overhear the message. The secure data transmission from the …
eavesdropper who can overhear the message. The secure data transmission from the …
Distributed secure switch-and-stay combining over correlated fading channels
In this paper, we study decode-and-forward relaying networks in the presence of direct links,
where they are used by the eavesdropper to overhear the confidential message from the …
where they are used by the eavesdropper to overhear the confidential message from the …
Two-relay distributed switch and stay combining
DS Michalopoulos… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
We study a distributed version of switch-and-stay combining (DSSC) for systems that utilize
two relays. In particular, four different scenarios are considered, depending on a) whether or …
two relays. In particular, four different scenarios are considered, depending on a) whether or …
Error analysis of the decode and forward protocol with selection combining
We analyze the error performance of a cooperative diversity system having two cooperating
mobile units or users (designated as source and relay) and a destination. The relay …
mobile units or users (designated as source and relay) and a destination. The relay …
Performance of distributed diversity systems with a single amplify-and-forward relay
We study the error performance of the binary phase-shift keying (BPSK)-modulated
distributed selection combining (SC) and distributed switched-and-stay combining (DSSC) …
distributed selection combining (SC) and distributed switched-and-stay combining (DSSC) …