{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:55:16Z","timestamp":1752360916818,"version":"3.37.3"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ECCS-1807660"],"award-info":[{"award-number":["ECCS-1807660"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1109\/twc.2021.3083685","type":"journal-article","created":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T22:36:20Z","timestamp":1622673380000},"page":"7431-7444","source":"Crossref","is-referenced-by-count":9,"title":["Cell-Edge Detection via Selective Cooperation and Generalized Canonical Correlation"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3967-637X","authenticated-orcid":false,"given":"Mohamed Salah","family":"Ibrahim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1175-2801","authenticated-orcid":false,"given":"Ahmed S.","family":"Zamzam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9330-0277","authenticated-orcid":false,"given":"Aritra","family":"Konar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3385-7911","authenticated-orcid":false,"given":"Nicholas D.","family":"Sidiropoulos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2021636"},{"key":"ref38","first-page":"9","article-title":"A radar anti-jamming technology based on canonical correlation analysis","volume":"1","author":"bai","year":"2005","journal-title":"Proc Int Conf Neural Netw Brain"},{"key":"ref33","first-page":"1815","article-title":"Interference mitigation through intelligent scheduling","author":"das","year":"2006","journal-title":"Proc Asilomar Conf Signals Syst Comput (ASILOMAR)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2007.387"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/390489"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2307\/2334380"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/78.317855"},{"key":"ref36","first-page":"2113","article-title":"Does canonical correlation analysis provide reliable information on data correlation in array processing?","author":"ge","year":"2009","journal-title":"Proc IEEE Int Conf Acoust Speech Signal Process"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.041311.100259"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.120610.100169"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.101205"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736761"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2021.3061218"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/78.502327"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2008.554"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/78.875471"},{"key":"ref27","first-page":"1342","article-title":"Joint user scheduling and power control for cell-edge performance improvement in backhaul-constrained network MIMO","author":"xu","year":"2013","journal-title":"Proc IEEE 24th Annu Int Symp Pers Indoor Mobile Radio Commun (PIMRC)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2346532"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2328098"},{"journal-title":"4G LTE\/LTE-Advanced for Mobile Broadband","year":"2013","author":"dahlman","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.853044"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/26.339839"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.936019"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/35.544334"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISSSE.1998.738086"},{"journal-title":"Base Station Cooperation Strategies Formulti-user Detection in Interference Limited Cellular Systems","year":"2008","author":"khattak","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/26.216499"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4679(196110)17:4<331::AID-JCLP2270170402>3.0.CO;2-D"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/78.564198"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.101202"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2980511"},{"journal-title":"Matrix Computations","year":"1983","author":"van loan","key":"ref57"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-010-9536-6"},{"key":"ref55","article-title":"A comparison of relaxations of multiset cannonical correlation analysis and applications","author":"rupnik","year":"2013","journal-title":"arXiv 1302 0974"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/28.3-4.321"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1162\/0899766042321814"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7439(87)80084-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/sym9060081"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9521-5"},{"article-title":"A canonical correlation approach to blind source separation","year":"2001","author":"borga","key":"ref40"},{"key":"ref12","first-page":"1","article-title":"Throughput improvement for cell-edge users using selective cooperation in cellular networks","author":"kumar","year":"2008","journal-title":"Proc 5th IFIP Int Conf Wireless Opt Commun Netw (WOCN)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2009.4808881"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4257"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.111211.101921"},{"key":"ref16","volume":"4","author":"proakis","year":"2001","journal-title":"Digital Communications"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.850350"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2004.1326846"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/78.992139"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.898869"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.821915"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0537-0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110603"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0942-z"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4907410"},{"key":"ref49","first-page":"227","article-title":"Generalization of canonical correlation analysis to three or more sets of variables","volume":"3","author":"carroll","year":"1968","journal-title":"Proc 76th Annu Conv Amer Psychol Assoc"},{"journal-title":"Multiuser Detection","year":"1998","author":"verdu","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0105"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2019.8815536"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2878544"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2698365"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2443729"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2007.894017"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2910475"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854050"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/9610145\/09445672.pdf?arnumber=9445672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T21:46:51Z","timestamp":1645480011000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9445672\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":64,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/twc.2021.3083685","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"type":"print","value":"1536-1276"},{"type":"electronic","value":"1558-2248"}],"subject":[],"published":{"date-parts":[[2021,11]]}}}