2019
DOI: 10.1016/j.icte.2018.04.002
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis for coexistence of LTE-LAA and Wi-Fi systems in the spatial, time, spectrum domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…The focus in studies [8] is the LTE-LAA and Wi-Fi networks coexistence in 5GHz using traffic optimization and analysis of interference which are used selection channel schemes. By implement Monte Carlo method analysis tool, named "3DMCAT", the LBT protocol was implemented as a simulation domain in both the frequency domains and time on frame-based spatial, time, spectrum domain equipment.…”
Section: Related Workmentioning
confidence: 99%
“…The focus in studies [8] is the LTE-LAA and Wi-Fi networks coexistence in 5GHz using traffic optimization and analysis of interference which are used selection channel schemes. By implement Monte Carlo method analysis tool, named "3DMCAT", the LBT protocol was implemented as a simulation domain in both the frequency domains and time on frame-based spatial, time, spectrum domain equipment.…”
Section: Related Workmentioning
confidence: 99%
“…FBE channel access has received less interest from researchers than LBE. Most existing papers evaluate FBE performance in long term evolution (LTE) license-assisted access (LAA) networks, the predecessor of NR-U, and typically in LTE LAA and Wi-Fi coexistence scenarios [19][20][21][22][23]. Both Sutton et al [24] and Abdelfattah et al [25] evaluate the limits of FBE with Markov chains and conclude that the strict duty cycle scheme of FBE causes domination by the competing (Wi-Fi) devices.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Due to availability of various signal processing tools, there is a possibility for someone to download audio files from the Internet, manipulate it, and then to sell it without permission of the legitimate owner(s). This phenomenon will further increase with the development of wireless technology [1]- [3]. Therefore, it is necessary to safeguard ownership of rightful owner(s) of the digital media.…”
Section: Introductionmentioning
confidence: 99%