Broadcast Reserved Opportunity Assisted Diversity Relaying Scheme and Its Performance Evaluation

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Broadcast Reserved Opportunity Assisted Diversity Relaying Scheme and Its Performance Evaluation

Relay-based transmission can over the benefits in terms of coverage extension as well as throughput improvement if compared to conventional direct transmission. In a relay enhanced cellular (REC) network, where multiple mobile terminals act as relaying nodes (RNs), multiuser diversity gain can be exploited. We propose an efficient relaying scheme, referred to as Broadcast Reserved Opportunity A...

متن کامل

Opportunistic Relaying in Time Division Broadcast Protocol with Incremental Relaying

In this paper, we investigate the performance of time division broadcast protocol (TDBC) with incremental relaying (IR) when there are multiple available relays. Opportunistic relaying (OR), i.e., the “best” relay is select for transmission to minimize the system’s outage probability, is proposed. Two OR schemes are presented. The first scheme, termed TDBC-OIR-I, selects the “best” relay from t...

متن کامل

A Credibility-based Congestion Control Scheme and its Performance Evaluation

A congestion control scheme based on credibility is proposed. In this scheme, the whole n etwork is divided into several indepen dent domains, a nd e ach dom ain con tains a congestion contro l server (CCS) and several control modules (CM). The CCS is used to collect credit information and make punish ment decisions based on the credit information, while the CM cr eates si gnaling packets to ca...

متن کامل

Complete tree subset difference broadcast encryption scheme and its analysis

The Subset Difference (SD) method proposed by Naor-Naor-Lotspeich is the most popular broadcast encryption (BE) scheme. It is suitable for real-time applications like Pay-TV. It has been suggested for use by the AACS standard for digital rights management in Blu-Ray and DVD discs. The SD method assumes the number of users to be a power of two. (1) We propose the Complete Tree Subset Difference ...

متن کامل

Broadcast Encryption Scheme and Its Implementation on Conditional Access System

Broadcast encryption schemes are suitable for one-way content distribution and protection applications. In this paper, we give a concrete implementation framework for how to introduce BE schemes into Conditional Access Systems(CAS). And then we compare the transmission performance of four highly efficient broadcast encryption schemes with traditional CAS system. Based on these experimental resu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EURASIP Journal on Wireless Communications and Networking

سال: 2008

ISSN: 1687-1499

DOI: 10.1155/2008/521834